e:\101028_140528_build_Client_Build_PabstBlueRibbon_3.0.517.0\source\source_sa\Bin\Release\Install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a4dd22cbe83f981299fb791155406894_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4dd22cbe83f981299fb791155406894_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Install.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Install.dll
Resource
win10v2004-20240802-en
General
-
Target
a4dd22cbe83f981299fb791155406894_JaffaCakes118
-
Size
201KB
-
MD5
a4dd22cbe83f981299fb791155406894
-
SHA1
afa6764cf5620c88a5f04a67f1af30eac8a7c63d
-
SHA256
2e5001fa0ba42d18ca4a2d71ad6c41f3ee31da975177795876094a12963ce8de
-
SHA512
ce8ba5573c6674aaab97d49f0df51e02e32bdd461d7314db50009192c75c34cf9c97524dde1ac9f1308051aff7a656eaf965563ca7062797d2f70752e2969cb3
-
SSDEEP
3072:ymeDmBqskJ6chZlDXAjVgBB2vWVU/rcnV5VSAj5RtGEmyL4ySThnvdrJqC5YTUHA:y8ShZUgBIcnV5VSA9REE14y2hHqOGEA
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource a4dd22cbe83f981299fb791155406894_JaffaCakes118 unpack001/$PLUGINSDIR/Install.dll -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_1
Files
-
a4dd22cbe83f981299fb791155406894_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c523d8653da5455667e3f82274f2f88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
lstrcmpiA
CopyFileA
ExitProcess
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
lstrcmpA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetCurrentProcess
user32
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
EndDialog
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
RegisterClassA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
TrackPopupMenu
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
gdi32
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
shell32
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
advapi32
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
comctl32
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
ole32
OleInitialize
OleUninitialize
CoCreateInstance
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/Install.dll.dll windows:5 windows x86 arch:x86
dc3e3d6edc5777686004e1880dddfbb7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
CryptAcquireContextA
CryptDestroyHash
CryptCreateHash
CryptDestroyKey
CryptDeriveKey
CryptDecrypt
CryptHashData
RegCreateKeyExA
LookupAccountNameA
ConvertSidToStringSidA
CryptReleaseContext
rpcrt4
UuidCreate
kernel32
TerminateProcess
WaitForSingleObject
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
DeleteFileA
GetTempFileNameA
GetTempPathA
lstrlenA
CreateEventA
OpenEventA
SetEvent
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
WriteFile
SetFilePointer
OutputDebugStringA
GetLocalTime
GetCurrentProcessId
GetVersion
GetShortPathNameA
GetWindowsDirectoryA
GetFileAttributesA
GetVolumeInformationA
GetSystemDirectoryA
GetCommandLineA
GetVersionExA
ResumeThread
CreateThread
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
CopyFileA
GetCurrentProcess
GetModuleHandleA
Sleep
GetTickCount
FindClose
FindFirstFileA
LoadLibraryExA
GetComputerNameA
SetErrorMode
GetDriveTypeA
SetLastError
GetPrivateProfileStringA
GetOEMCP
GetACP
GetThreadLocale
GetUserDefaultLangID
GetSystemDefaultLangID
DosDateTimeToFileTime
GetComputerNameExA
GetProcessHeap
HeapAlloc
HeapFree
WritePrivateProfileStringA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
MultiByteToWideChar
lstrcmpA
CreateDirectoryA
GetFileSize
ReadFile
CreateFileA
CloseHandle
LoadLibraryA
GetLastError
LocalAlloc
FormatMessageA
LocalFree
GetProcAddress
FreeLibrary
WideCharToMultiByte
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetStdHandle
ExitProcess
LCMapStringW
LCMapStringA
RaiseException
HeapDestroy
HeapReAlloc
HeapSize
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
VirtualFree
VirtualAlloc
GetCPInfo
IsValidCodePage
user32
GetClassNameA
PostMessageA
wsprintfA
EnumWindows
ole32
CLSIDFromString
CoCreateInstance
oleaut32
SysFreeString
SysAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
shlwapi
PathCombineA
PathFileExistsA
Exports
Exports
AddHiJackThis
ApplyHostFileChanges
ClearPendingRebootFileOperation
Close
ClosePartnerWindows
CreateDir
CreateMachineID
DecryptString
EncryptString
Get
GetBannerId
GetCVFValue
GetChannelId
GetClientInfo
GetClientUmt
GetConfigUrl
GetContentId
GetDid
GetInstallerLoc
GetPartnerId
GetRepairLoc
GetStringResource
GetTempExe
GetUninstallerLoc
GetUserAgentTimeStamp
InstallerStop
IsElevated
KeyExists
KillProcessByModuleName
KillProcessByProcessId
LoadSettingsFromWeb
Log
LogDataStore
ParseCmdLine
PartnerIsRunning
RestartIEUser
ReverseHostFileChanges
RunAsAdmin
RunAsUser
SendHttpRequest
SendTrackedEvent
Set
SetBannerId
SetCVFValue
SetChannelId
SetClientUmt
SetConfigUrl
SetContentId
SetDid
SetInstallerLoc
SetLogPath
SetPartnerId
SetRepairLoc
SetUninstallerLoc
ShowDialog
ShowDialogSet
ShowDialogSetURL
ShowToaster
ShowURLDialog
StartEvent
StopEvent
VerifySignature
VerifySignatureOnParent
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
$PLUGINSDIR/modern-header.bmp