userinit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6489a78e06f61c1669f3a402de9d73d4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6489a78e06f61c1669f3a402de9d73d4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6489a78e06f61c1669f3a402de9d73d4_JaffaCakes118
-
Size
190KB
-
MD5
6489a78e06f61c1669f3a402de9d73d4
-
SHA1
13f777392e9f0a45fecb75d1c82e5dc10a13ecb7
-
SHA256
528765a6702fb376aca3a2fb349f907c9433a36da12aa8011db3bd3256036779
-
SHA512
1089043e697b443a4328bb1ad88eec7c51dba4a474534652a9cc1f47c624e4e78d3dcbe57a4a977c599d18afc898394bf8e3404a3cbf29bc303506264005c8f9
-
SSDEEP
3072:O9ZreLGezf8djBg1JgsLq7x8N6GbkejI9OiqCba2tt8o8Mn5cJjWYfUtKPnfF4Hf:Ovr81Ag1KYq7x8N6ZeE9Oiqaasnt5t8w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6489a78e06f61c1669f3a402de9d73d4_JaffaCakes118
Files
-
6489a78e06f61c1669f3a402de9d73d4_JaffaCakes118.exe windows:6 windows x86 arch:x86
da2666d3347f129193ab91a0eab85c0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
DbgPrint
RtlInitUnicodeString
NtOpenKey
NtClose
api-ms-win-core-localregistry-l1-1-0
RegCreateKeyExW
RegDeleteTreeW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
api-ms-win-core-processthreads-l1-1-0
SetThreadPriority
GetCurrentThread
CreateThread
GetCurrentProcess
CreateProcessW
OpenProcessToken
user32
CharNextW
GetKeyboardLayout
GetSystemMetrics
ExitWindowsEx
MessageBoxW
LoadStringW
LoadRemoteFonts
DefWindowProcW
RegisterClassExW
DestroyWindow
CreateWindowExW
SystemParametersInfoW
userenv
ord175
msvcrt
_ismbblead
_XcptFilter
_exit
_cexit
exit
_wcsicmp
memset
memmove
_vsnwprintf
_initterm
_acmdln
_amsg_exit
__setusermatherr
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
__getmainargs
__p__commode
kernel32
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedExchange
LoadLibraryA
RegOpenKeyExA
RegQueryValueExA
ExpandEnvironmentStringsA
LoadLibraryExA
InterlockedCompareExchange
DelayLoadFailureHook
HeapSetInformation
SetCurrentDirectoryW
FormatMessageW
GetFileAttributesExW
GetSystemDirectoryW
SetLastError
ExpandEnvironmentStringsW
GetUserDefaultLangID
SetEvent
OpenEventW
Sleep
WaitForSingleObject
CloseHandle
GetLastError
SetEnvironmentVariableW
SearchPathW
GetCurrentThreadId
CompareFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
GetEnvironmentVariableW
LocalAlloc
LocalFree
GetVersionExW
lstrlenW
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 164KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE