RegisterIEPKEYs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8c888919b57a51b4599d17865e6f9b11_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8c888919b57a51b4599d17865e6f9b11_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c888919b57a51b4599d17865e6f9b11_JaffaCakes118
-
Size
217KB
-
MD5
8c888919b57a51b4599d17865e6f9b11
-
SHA1
d5bf70a69c8d98d08def20ba5525c426c0501c60
-
SHA256
c71e1df76da1e238588adacb7c05ed67e3cef15ac0f1f347b992c67212679706
-
SHA512
9536d423403319b70e483f2daa3858fc802a14bfc192769e529b6162859dd637fb091a77a4d40964b7747dfdde447f04e8729a4ee61794249d754e2a556011c8
-
SSDEEP
6144:1HlE18XL6Jx9Rl2PLLoDKJfXb4OhVr5hu/ZspzJyjZ6:pW18XEx9f2jwEfXb4OhV9YBsGA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c888919b57a51b4599d17865e6f9b11_JaffaCakes118
Files
-
8c888919b57a51b4599d17865e6f9b11_JaffaCakes118.exe windows:6 windows x86 arch:x86
e9b719bcdd8790c51f2186b9a9011ae1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExA
ExpandEnvironmentStringsW
HeapSize
DecodePointer
EncodePointer
IsWow64Process
LocalAlloc
DeviceIoControl
HeapDestroy
GetLastError
GetCommandLineW
GetEnvironmentVariableW
LocalFree
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessHeap
HeapFree
VirtualQuery
MapViewOfFile
CreateFileMappingW
GetFileSize
UnmapViewOfFile
TlsAlloc
GetLocalTime
TlsSetValue
HeapReAlloc
HeapAlloc
TlsGetValue
GetTempFileNameW
GetWindowsDirectoryW
GetFileAttributesW
GetTempPathW
SetLastError
FormatMessageW
RaiseException
ExitProcess
TlsFree
GetWindowsDirectoryA
CloseHandle
GetCurrentThread
ReleaseMutex
WaitForSingleObject
SetFilePointer
WriteFile
GetModuleFileNameA
CreateMutexW
CreateFileW
GetModuleFileNameW
DeleteFileW
GetVersion
GetSystemInfo
CreateMutexA
CreateFileMappingA
CreateFileA
DeleteFileA
LoadLibraryA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleW
GetFileSizeEx
FlushFileBuffers
WideCharToMultiByte
MultiByteToWideChar
OutputDebugStringA
IsDebuggerPresent
HeapCreate
msvcrt
feof
fgetws
_wfopen
_wcsnicmp
fclose
towlower
malloc
_wtoi
??1type_info@@UAE@XZ
_vsnwprintf
free
wcstok
_vsnprintf
_controlfp
_unlock
wcsrchr
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler3
_lock
_onexit
swscanf_s
iswctype
memcpy
_purecall
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_wcsicmp
memset
__dllonexit
shell32
CommandLineToArgvW
ord165
advapi32
OpenThreadToken
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessAllowedAce
EqualSid
SetSecurityDescriptorDacl
OpenProcessToken
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
InitializeSecurityDescriptor
dbghelp
MiniDumpWriteDump
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
ole32
CoUninitialize
CoInitializeEx
propsys
PSRegisterPropertySchema
PSUnregisterPropertySchema
user32
UnregisterClassA
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE