x:\installer\Loader\Release\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aab82c4076268a66efef376eef3105e0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aab82c4076268a66efef376eef3105e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aab82c4076268a66efef376eef3105e0_JaffaCakes118
-
Size
184KB
-
MD5
aab82c4076268a66efef376eef3105e0
-
SHA1
23e5e8f13c800c7d06b05e34edf12006432861c3
-
SHA256
8a3c85a0c70ae6176a6a63c340d68db57df4614eadaed7f4956e8cd821685918
-
SHA512
e7e3a3f28899d16ccb16970784e8cba8daab2833beafc86424aa3c1ae537275aa7f79137db103212836f3adf3dad9a2e37b405cbdae3a8fd2cc4727c4f126d63
-
SSDEEP
3072:CXVLtuiadEZQuSJc5k+ne9r3cZGsFV/WdcpkEv4i7ywIMgEkS9qPwB3n85jdLXmO:8NQiadEZQuSJc5k+ne9r3cZGsFV/Wdc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aab82c4076268a66efef376eef3105e0_JaffaCakes118
Files
-
aab82c4076268a66efef376eef3105e0_JaffaCakes118.exe windows:4 windows x86 arch:x86
e682cd3a516bdb94c4f554d16655c4f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetErrorDlg
InternetWriteFile
InternetOpenW
InternetCrackUrlW
InternetConnectW
HttpEndRequestW
InternetGetLastResponseInfoW
HttpOpenRequestW
HttpAddRequestHeadersW
InternetReadFile
InternetCloseHandle
InternetQueryOptionW
InternetSetOptionW
InternetSetFilePointer
HttpQueryInfoW
HttpSendRequestExW
HttpSendRequestW
comctl32
ord17
ws2_32
select
kernel32
LocalAlloc
SetEndOfFile
GetSystemInfo
VirtualProtect
IsBadCodePtr
GetOEMCP
GetStringTypeA
CreateFileA
IsBadReadPtr
GetCommandLineA
FlushFileBuffers
SetStdHandle
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
WriteFile
ReadFile
GetLastError
GlobalFree
CloseHandle
SleepEx
GetTickCount
FreeLibrary
GlobalAlloc
MulDiv
TerminateThread
WaitForSingleObject
CreateThread
GetCommandLineW
SizeofResource
LockResource
LoadResource
InitializeCriticalSection
DeleteCriticalSection
RaiseException
CompareStringA
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
SetLastError
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringA
SetFilePointer
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
VirtualQuery
GetCurrentProcess
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
TerminateProcess
user32
GetDesktopWindow
TranslateMessage
MsgWaitForMultipleObjects
UpdateWindow
KillTimer
DestroyWindow
SetTimer
GetWindowRect
GetClientRect
SetWindowPos
GetDlgItem
IsWindow
ShowWindow
GetParent
RedrawWindow
Exports
Exports
GetSha256
Sections
.text Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ