e:\builds\moz2_slave\rel-m-rel-w32-bld\build\obj-firefox\toolkit\mozapps\update\updater\updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8e6a17ffd9966c4e8e71e4bb8dd1d0cb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e6a17ffd9966c4e8e71e4bb8dd1d0cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e6a17ffd9966c4e8e71e4bb8dd1d0cb_JaffaCakes118
-
Size
342KB
-
MD5
8e6a17ffd9966c4e8e71e4bb8dd1d0cb
-
SHA1
acf6f091d71e8a609156e23e7072c367081ed037
-
SHA256
bf02d8da7273523de84ee004bd5a04f57c982998d91fa6d5a42371e91f55cae6
-
SHA512
c4bb5e732a876551956faa7b75f87137a7cbfffa484ddbe5cf55e94e0571b013c26cf91185acb7d4f70bcf5d7a3382453a2914cab844bdc5d01d79adee846a20
-
SSDEEP
6144:rpbt63Jbph4Dahhrufo0Pe3PfcKrKyw8LQR4obIiHEWeWY:rpbtOdh4D+wWdGyJQTbIJWY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e6a17ffd9966c4e8e71e4bb8dd1d0cb_JaffaCakes118
Files
-
8e6a17ffd9966c4e8e71e4bb8dd1d0cb_JaffaCakes118.exe windows:4 windows x86 arch:x86
341af390ec5df9ff39a1e9b0d7274a6e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEndOfFile
FindNextFileW
CreateFileW
CreateProcessW
GetPrivateProfileStringW
CloseHandle
MultiByteToWideChar
OpenProcess
MoveFileExW
LocalFree
GetLastError
WideCharToMultiByte
GetLongPathNameW
GetModuleHandleW
GetModuleFileNameW
CompareStringA
SetFilePointer
FindFirstFileW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
InitializeCriticalSection
LoadLibraryA
FormatMessageW
FlushFileBuffers
WaitForSingleObject
FindClose
GetTempFileNameW
CopyFileW
WriteConsoleW
Sleep
RaiseException
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
SetFileAttributesW
GetFileAttributesW
MoveFileW
EnterCriticalSection
LeaveCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
RemoveDirectoryW
GetDriveTypeW
DeleteFileW
HeapReAlloc
GetDriveTypeA
CreateFileA
GetProcAddress
GetModuleHandleA
ExitProcess
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
GetConsoleCP
GetConsoleMode
HeapSize
ReadFile
RtlUnwind
SetEnvironmentVariableA
GetFullPathNameW
GetCurrentDirectoryA
CompareStringW
user32
SetTimer
GetClientRect
GetDC
LoadIconW
OffsetRect
ReleaseDC
GetDlgItem
EndDialog
GetParent
SetWindowPos
GetDesktopWindow
ScreenToClient
GetWindowRect
SendMessageW
DrawTextW
SetWindowTextW
DialogBoxParamW
CopyRect
gdi32
SelectObject
wsock32
ntohl
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
comctl32
InitCommonControlsEx
shell32
ShellExecuteExW
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rrdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE