D:\b\slave\chrome-official\build\src\chrome\Release\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
638d119f21f4c7dd6a2003076b6ce1bd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
638d119f21f4c7dd6a2003076b6ce1bd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
638d119f21f4c7dd6a2003076b6ce1bd_JaffaCakes118
-
Size
1.1MB
-
MD5
638d119f21f4c7dd6a2003076b6ce1bd
-
SHA1
8c90515a9a1f1d16aabb5f53c179007ab42ff558
-
SHA256
f496425eec81f084652ebac2f863c1efb29d73e0ccd024e1595ca5abf2cc81d7
-
SHA512
8f50202902e270d1f0d0afe164a03570c0f27a417aeb14765311bd554e6251f31a9b09a94b5a4a0f5861659f6bfb89c53a4a5bd8b7a2f42eb369a4bd4ef8995b
-
SSDEEP
24576:WG2AO2Ns6PTDVCEJUE9RygSlG6kkkkkkj0HRZQYgfItiu0F:WRAOcXPXVCETogScNRi3DdF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 638d119f21f4c7dd6a2003076b6ce1bd_JaffaCakes118
Files
-
638d119f21f4c7dd6a2003076b6ce1bd_JaffaCakes118.exe windows:5 windows x86 arch:x86
2f5ee1f72cec35d547b44236cd61f95b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindNextFileW
FindClose
FindFirstFileW
CloseHandle
GetLastError
GetProcAddress
GetModuleHandleW
InitializeCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
WaitForSingleObject
GetModuleFileNameW
ExpandEnvironmentStringsW
GetCommandLineW
LocalFree
GetFullPathNameW
GetTempFileNameW
MapViewOfFile
UnmapViewOfFile
FreeLibrary
LoadLibraryExW
MoveFileExW
CreateDirectoryW
SetFileTime
WriteFile
CopyFileW
GetFileAttributesW
FileTimeToSystemTime
ReadFile
CreateFileW
GetTempPathW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
RemoveDirectoryW
GetFileTime
GetFileAttributesExW
FileTimeToLocalFileTime
DeleteFileW
InterlockedCompareExchange
InterlockedExchange
CreateMutexW
SetFilePointer
CreateProcessW
GetTickCount
FormatMessageA
SetLastError
GetModuleHandleA
GetCurrentThreadId
OutputDebugStringA
ReleaseMutex
GetCurrentProcessId
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
OpenProcess
GetExitCodeProcess
TerminateProcess
GetStdHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
FormatMessageW
GetVersionExW
GetEnvironmentVariableW
SetEnvironmentVariableW
QueryPerformanceCounter
GetSystemDirectoryW
GetWindowsDirectoryW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
Sleep
RaiseException
IsDebuggerPresent
WideCharToMultiByte
MultiByteToWideChar
GetShortPathNameW
LoadLibraryW
FindResourceW
LoadResource
GetLocaleInfoW
SizeofResource
GetThreadLocale
LockResource
WTSGetActiveConsoleSessionId
UnhandledExceptionFilter
GetStartupInfoW
HeapFree
GetFileInformationByHandle
PeekNamedPipe
GetFileType
HeapAlloc
SetEndOfFile
GetProcessHeap
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapReAlloc
ExitProcess
GetTimeZoneInformation
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetTimeFormatA
GetDateFormatA
GetModuleFileNameA
HeapSize
LCMapStringA
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
CreateFileA
VirtualAlloc
RtlUnwind
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetCurrentProcess
user32
GetWindowLongW
SetWindowLongW
CharUpperW
SendMessageTimeoutW
FindWindowExW
MessageBoxW
CallNextHookEx
LoadIconW
SetWindowsHookExW
UnhookWindowsHookEx
SendMessageW
advapi32
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
GetFileSecurityW
GetUserNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateProcessAsUserW
RegCreateKeyExW
shell32
SHFileOperationW
CommandLineToArgvW
SHGetFolderPathW
ord680
ord59
ShellExecuteExW
SHChangeNotify
ole32
PropVariantClear
CoCreateInstance
CoInitializeEx
CoSetProxyBlanket
CoUninitialize
shlwapi
UrlCanonicalizeW
SHDeleteEmptyKeyW
SHStrDupW
SHDeleteKeyW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
urlmon
CreateURLMoniker
wtsapi32
WTSQueryUserToken
ws2_32
ntohl
oleaut32
VariantInit
SysAllocString
SysFreeString
VariantClear
Sections
.text Size: 420KB - Virtual size: 419KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 301KB - Virtual size: 301KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.prdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE