e:\src\setshell\rel32s\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a4d9ec3fff9ac54e5720bdc6b2ca88db_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4d9ec3fff9ac54e5720bdc6b2ca88db_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4d9ec3fff9ac54e5720bdc6b2ca88db_JaffaCakes118
-
Size
508KB
-
MD5
a4d9ec3fff9ac54e5720bdc6b2ca88db
-
SHA1
4a4a45913fe402bc47d7bd051fcb9fca239eac94
-
SHA256
9abd1d27dc17749a32b43a5613dc82de70a979ec47bfe679c01bf4a0fcdb0731
-
SHA512
8582aa5a009238a255c92afd6ab0562bf29a058729a77f3fdc67d0cba82086eade7d148190b9e87094f4da8952cd050b71bd7fd683e4307fa3ca7d34cc9cb478
-
SSDEEP
12288:ai8Adpje+9D/M/gDtZPA25Yeyonhl5ccsbIEE3HatXxCBimQC7E1BcWV9:H59D/rro14HD0IytBCBaCg11V9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4d9ec3fff9ac54e5720bdc6b2ca88db_JaffaCakes118
Files
-
a4d9ec3fff9ac54e5720bdc6b2ca88db_JaffaCakes118.exe windows:4 windows x86 arch:x86
6c822d01175723462162e956c15f0ac0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
GetSystemInfo
GetVersion
SetUnhandledExceptionFilter
MoveFileA
DeleteFileA
SetCurrentDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
GetLastError
GetCurrentProcess
WriteFile
GetThreadContext
VirtualQuery
IsBadWritePtr
GetCurrentProcessId
SetFilePointer
CreateFileA
GlobalMemoryStatus
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetFullPathNameA
FileTimeToLocalFileTime
GetModuleFileNameA
CopyFileA
RemoveDirectoryA
GetTimeZoneInformation
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
LoadLibraryA
GetLocaleInfoA
RaiseException
VirtualProtect
FlushFileBuffers
SetStdHandle
InitializeCriticalSection
InterlockedExchange
RtlUnwind
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
ReadFile
VirtualFree
HeapCreate
GetWindowsDirectoryA
FindClose
GetVersionExA
CreateToolhelp32Snapshot
Process32First
GetCurrentThreadId
OpenProcess
Process32Next
GetTempPathA
GetDiskFreeSpaceA
InterlockedDecrement
InterlockedIncrement
FreeResource
FindResourceA
LoadResource
SizeofResource
LockResource
LocalAlloc
LocalLock
LocalUnlock
GetProcAddress
FreeLibrary
FindNextFileA
GetDriveTypeA
CompareStringA
FindFirstFileA
LocalFree
FileTimeToSystemTime
HeapDestroy
TlsGetValue
TlsSetValue
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
SetFileAttributesA
GetFileAttributesA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapFree
HeapReAlloc
GetSystemTimeAsFileTime
TerminateProcess
HeapSize
QueryPerformanceCounter
GetTickCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
SetLastError
TlsFree
SetEnvironmentVariableW
user32
DispatchMessageA
TranslateMessage
GetDC
ReleaseDC
CharLowerA
CharUpperA
CharPrevA
CharNextA
GetSystemMetrics
LoadIconA
SendMessageA
SendDlgItemMessageA
InvalidateRect
UpdateWindow
EndDialog
SystemParametersInfoA
GetParent
GetWindowRect
SetWindowPos
CreateDialogIndirectParamA
IsWindow
GetSysColor
LoadStringA
MessageBoxA
FindWindowA
SetWindowTextA
PeekMessageA
IsDialogMessageA
PostQuitMessage
DestroyWindow
RegisterClassA
CreateWindowExA
DefWindowProcA
PostThreadMessageA
GetMessageA
advapi32
OpenProcessToken
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
AllocateAndInitializeSid
GetTokenInformation
EqualSid
RegCreateKeyA
RegCloseKey
gdi32
SetTextColor
SetBkColor
DeleteObject
CreateSolidBrush
GetDeviceCaps
comctl32
ord17
version
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25.2MB - Virtual size: 25.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ