userinit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8a4f3d995793d1077e85e128cf4e26fe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a4f3d995793d1077e85e128cf4e26fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a4f3d995793d1077e85e128cf4e26fe_JaffaCakes118
-
Size
50KB
-
MD5
8a4f3d995793d1077e85e128cf4e26fe
-
SHA1
1f9217809957e2d5a8d038ec04de00cce23491e3
-
SHA256
2ea38e2113335cc3d487b3e1fb917e8d70c6036622c339bfac8df6a2e253ac69
-
SHA512
46da2ac053308b22f4b28f014aeec8fa2aa5e7847ef522e32833aab8c03ad6bfdebc649b3e734d5a96e5a9a92aa96289cb4a97087a3022692c8419a0b605a464
-
SSDEEP
768:cJuOa0dIDDB0rubaLarkRP2qyXz4vT3PDP84nyzFN7AkTMZz/thGQfA:cJuB0ODDB0roaLaOPfyz4cLBL4HGQI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a4f3d995793d1077e85e128cf4e26fe_JaffaCakes118
Files
-
8a4f3d995793d1077e85e128cf4e26fe_JaffaCakes118.exe windows:5 windows x86 arch:x86
ced5d7f746be0878535b1b0d75d731c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
OpenEventW
SetEvent
GetCurrentProcessId
GetUserDefaultLangID
GetCurrentProcess
GetSystemDirectoryW
GetFileAttributesExW
lstrcmpiW
FormatMessageW
SetCurrentDirectoryW
CreateThread
SetThreadPriority
GetCurrentThread
lstrcmpW
GetLastError
LocalReAlloc
InterlockedCompareExchange
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WaitForSingleObject
GetStartupInfoA
GetModuleHandleA
DelayLoadFailureHook
ExpandEnvironmentStringsW
SearchPathW
CloseHandle
CreateProcessW
CompareFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcpyW
lstrcatW
lstrlenW
SetEnvironmentVariableW
GetEnvironmentVariableW
LocalAlloc
LocalFree
GetVersionExW
GetSystemTime
user32
CreateWindowExW
DestroyWindow
RegisterClassExW
DefWindowProcW
LoadRemoteFonts
wsprintfW
GetSystemMetrics
GetKeyboardLayout
SystemParametersInfoW
GetDesktopWindow
CharNextW
ExitWindowsEx
MessageBoxW
LoadStringW
advapi32
RegOpenKeyExA
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegCreateKeyExW
OpenProcessToken
DeregisterEventSource
RegisterEventSourceW
ReportEventW
RegQueryValueExA
RegSetValueExW
crypt32
CryptProtectData
winspool.drv
SpoolerInit
ntdll
RtlConvertSidToUnicodeString
NtClose
RtlLengthSid
RtlCopySid
_itow
RtlFreeUnicodeString
DbgPrint
wcslen
wcscpy
wcscat
wcscmp
_wcsicmp
memmove
RtlInitUnicodeString
NtOpenKey
NtQueryInformationToken
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fzfpljo Size: 4KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE