C:\Briqs\VSU\target\briqs2\retail\i386\SetRegNI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a70acb4b7ea80687f86c882302a8c710_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a70acb4b7ea80687f86c882302a8c710_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a70acb4b7ea80687f86c882302a8c710_JaffaCakes118
-
Size
232KB
-
MD5
a70acb4b7ea80687f86c882302a8c710
-
SHA1
3cb81b4242a637bc293b7f25618633669c106d35
-
SHA256
b0b87c994ac980b112edc8a2c22618ff0668f3014b012b6109ebab68562b34d2
-
SHA512
8be88fed9e7d9ca1a136985557dd718c5e3be1dc44dc833a7e51f38a8ca4c244d92c1d643791c935855180ab071420e6987937493a955c00a6e632c73ce42480
-
SSDEEP
6144:lPT92NzSA8fDz5fz8ZiGlcEhzU6UI4nTioL41J4:WzmDVoLhzHSnTioLo4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a70acb4b7ea80687f86c882302a8c710_JaffaCakes118
Files
-
a70acb4b7ea80687f86c882302a8c710_JaffaCakes118.exe windows:6 windows x86 arch:x86
2db4b88d4feacddc0a893c2cc317e968
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegCreateKeyExA
RegCloseKey
kernel32
ReleaseMutex
CloseHandle
OpenProcess
GetExitCodeProcess
WaitForSingleObject
GetLastError
CreateProcessA
WriteFile
CreateFileA
GetTempPathA
OpenMutexA
Sleep
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetProcAddress
GetModuleHandleA
ExitProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
MultiByteToWideChar
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
LoadLibraryA
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
RtlUnwind
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 424KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE