setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
66e0fffa1b52247ce6bd19a79633778c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66e0fffa1b52247ce6bd19a79633778c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66e0fffa1b52247ce6bd19a79633778c_JaffaCakes118
-
Size
487KB
-
MD5
66e0fffa1b52247ce6bd19a79633778c
-
SHA1
9122477038d9c04b722dba1f18d2e3ba7358d959
-
SHA256
2496aaa0c1e971590a684921c3faf4b5dedffb390f03b412eab8c1adc8879610
-
SHA512
eb546288f102a12731da81d2972ed0a0c4d44386db015f34e00f094d59c87a7a97ee79de38011b6ac970dea04a02f7ca75c9cfc5ea584aab101531db4cb6f9e1
-
SSDEEP
6144:ToLY3VafUTGekL7sHW3n+A12LGveZGzLI2hXWaBn4GgmRhXjxS6fgALAo4pg+dFF:NMU/kviW3+AztzE2lBFr5znG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66e0fffa1b52247ce6bd19a79633778c_JaffaCakes118
Files
-
66e0fffa1b52247ce6bd19a79633778c_JaffaCakes118.exe windows:4 windows x86 arch:x86
de26c763312295b50f6ad716d08fe2da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
gdi32
GetStockObject
kernel32
LocalFree
lstrlenW
lstrcmpiW
GetLastError
LocalAlloc
LocalReAlloc
FormatMessageW
GetFileAttributesW
FindClose
FindFirstFileW
GetSystemDirectoryW
GetFullPathNameW
ExpandEnvironmentStringsW
CreateDirectoryW
CloseHandle
FindNextFileW
GetTempPathW
HeapFree
HeapAlloc
GetProcessHeap
lstrcmpW
WriteFile
lstrlenA
WideCharToMultiByte
SetFilePointer
CreateFileW
DeleteFileW
FormatMessageA
MultiByteToWideChar
GetProcAddress
GetModuleHandleA
GetPrivateProfileStringW
GetVersionExA
GetCurrentProcess
FreeLibrary
LoadLibraryW
CreateProcessW
GetWindowsDirectoryW
GetPrivateProfileSectionW
GetPrivateProfileIntW
SetCurrentDirectoryW
GetModuleFileNameW
IsValidLocale
CopyFileW
ReleaseMutex
OpenMutexW
CreateMutexW
SetLastError
GlobalFree
GlobalAlloc
GetTimeFormatW
GetDateFormatW
GetCommandLineW
WaitForSingleObject
Sleep
GetDriveTypeW
GetDiskFreeSpaceExW
GetExitCodeProcess
ReadFile
GetVolumeInformationW
GetLogicalDriveStringsW
QueryDosDeviceW
InterlockedDecrement
GetCurrentDirectoryW
InterlockedIncrement
DeviceIoControl
RaiseException
LoadLibraryA
InterlockedExchange
OpenEventW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
HeapSize
HeapReAlloc
ole32
CoInitialize
CoCreateInstance
CoUninitialize
CLSIDFromProgID
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
shell32
ShellExecuteW
user32
KillTimer
MessageBoxW
MessageBeep
MessageBoxIndirectW
LoadIconW
LoadCursorW
RegisterClassExW
CreateWindowExW
UpdateWindow
PostQuitMessage
DefWindowProcW
PeekMessageW
MsgWaitForMultipleObjects
GetWindowLongW
CheckDlgButton
CreateDialogParamW
SetWindowTextW
GetDlgItem
SetDlgItemTextW
SetWindowLongW
DestroyWindow
ShowWindow
SetTimer
CharPrevW
MessageBoxA
LoadStringA
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
SendMessageW
CharNextW
FindWindowW
SetForegroundWindow
GetKeyboardType
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
msvcrt
_adjust_fdiv
memmove
_vsnwprintf
wcschr
iswprint
_vsnprintf
wcsstr
wcstol
_wtoi
_wcsnicmp
wcsncmp
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_controlfp
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
rpcrt4
RpcServerUnregisterIf
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
RpcStringBindingComposeW
NdrClientCall2
NdrServerCall2
RpcBindingFree
RpcStringFreeW
RpcBindingFromStringBindingW
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 67KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 275KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE