c:\Projects\WhenU\UInstallProject\UInstall\Release\UInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6661719644b940b34694d4fa6a4ed0dc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6661719644b940b34694d4fa6a4ed0dc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6661719644b940b34694d4fa6a4ed0dc_JaffaCakes118
-
Size
906KB
-
MD5
6661719644b940b34694d4fa6a4ed0dc
-
SHA1
53587dc8f9608e10744e0f84b091678b4c478e15
-
SHA256
c66bc6794b7dd1272efc37df9f60f9039f9b989794e87d3c881288a5ee8772f5
-
SHA512
ab73a0c380221b7159d685558ed4a29619c8c74255266892cd5ebe6afca05baba79a9fae7cc1bf552471665a49a899307cba93e6b5bf55214a530294101dfacd
-
SSDEEP
24576:qZilryc9VuI2livyctA6TKHM9RnShnr98pJ:DywVR2QactA672KP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6661719644b940b34694d4fa6a4ed0dc_JaffaCakes118
Files
-
6661719644b940b34694d4fa6a4ed0dc_JaffaCakes118.exe windows:4 windows x86 arch:x86
f92ee7d276f7f6d46d544d7afc8756f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExA
LoadLibraryA
FreeLibrary
GetTempPathA
GetFileAttributesA
GetWindowsDirectoryA
lstrcpyA
CreateDirectoryA
GetLastError
GetCurrentProcessId
DeleteFileA
GetProcAddress
WaitForSingleObject
CloseHandle
MultiByteToWideChar
CreateFileA
WriteFile
GetModuleFileNameA
lstrlenA
GetTempFileNameA
GetShortPathNameA
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
ResumeThread
GetProcessHeap
RaiseException
FindResourceExA
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
DeleteCriticalSection
InitializeCriticalSection
GetFileSize
CreateFileMappingA
MapViewOfFile
CompareStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
LockResource
GetSystemDirectoryA
lstrcatA
OpenProcess
TerminateProcess
lstrlenW
RemoveDirectoryA
lstrcpynA
FileTimeToSystemTime
FlushInstructionCache
HeapAlloc
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
LoadResource
SizeofResource
FindResourceA
SystemTimeToFileTime
GetLocalTime
GetCommandLineA
lstrcmpiA
HeapFree
GetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
VirtualFree
HeapCreate
ExitProcess
GetStartupInfoA
GetModuleHandleA
VirtualQuery
LocalAlloc
HeapDestroy
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
user32
wsprintfA
PostQuitMessage
CharNextA
UnregisterClassA
CreateWindowExA
LoadCursorA
GetClassInfoExA
RegisterClassExA
DestroyWindow
GetSystemMetrics
SendMessageTimeoutA
IsWindow
GetWindowThreadProcessId
FindWindowA
CallWindowProcA
DefWindowProcA
GetWindowLongA
SetWindowLongA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
shell32
SHFileOperationA
ShellExecuteExA
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysFreeString
LoadTypeLi
VarR8FromStr
RegisterTypeLi
SysAllocStringLen
shlwapi
PathFindFileNameA
PathGetArgsA
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 808KB - Virtual size: 808KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ