TrustedInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
addf9c8d33d0e8bc821c321d6084919b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
addf9c8d33d0e8bc821c321d6084919b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
addf9c8d33d0e8bc821c321d6084919b_JaffaCakes118
-
Size
217KB
-
MD5
addf9c8d33d0e8bc821c321d6084919b
-
SHA1
c99410156e9d88ab6e73474329e6db0c341eadc7
-
SHA256
696b673cf7239ad9fc5c1c0132b6652f97153478f62e70f81e06f50b64973325
-
SHA512
3478107f6625a4012e3ddd7c5dc93e2e031b412ea41dc5cad69bd0f3311cbe25f622e9ea46e13effb64e2eb37daa4216459ea0dca3f0f668a260c40ff7d53d15
-
SSDEEP
3072:yXEgwW6ntCESQHtDxl7S9njyrAeHqRRzAFHjmsjuhc9OYp2iv6q9jV:yXE0hESQNDxllrM/zAnjuTKX9jV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource addf9c8d33d0e8bc821c321d6084919b_JaffaCakes118
Files
-
addf9c8d33d0e8bc821c321d6084919b_JaffaCakes118.exe windows:6 windows x86 arch:x86
eb3d4b4843183a5b71eaed184f4ed764
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
SetServiceStatus
RegCloseKey
RegOpenKeyExW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
OpenProcessToken
RegOpenKeyW
RegCreateKeyExW
RegDeleteKeyW
CloseServiceHandle
InitiateShutdownW
LookupPrivilegeValueW
AdjustTokenPrivileges
ChangeServiceConfigW
QueryServiceConfigW
OpenSCManagerW
OpenServiceW
RegQueryValueExW
RegEnumValueW
kernel32
LoadLibraryW
GetSystemDirectoryW
GetTickCount
QueryPerformanceCounter
CreateDirectoryW
ExpandEnvironmentStringsW
GetFullPathNameW
GetFileAttributesExW
GetProcAddress
GetFileAttributesW
GetVersionExW
lstrlenW
GetEnvironmentVariableW
GetSystemTime
MoveFileExW
GetWindowsDirectoryW
CreateProcessW
CreateFileW
SetFileTime
GetExitCodeProcess
FindFirstFileW
CompareFileTime
FindNextFileW
DeleteFileW
FindClose
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpW
ExitProcess
HeapSetInformation
CreateEventW
GetLastError
CreateThread
WaitForMultipleObjects
TerminateThread
WaitForSingleObject
GetExitCodeThread
CloseHandle
SetEvent
InterlockedExchange
GetCurrentThreadId
msvcrt
__set_app_type
wcstoul
??2@YAPAXI@Z
_vsnwprintf
_vsnprintf
memset
memcpy
??3@YAXPAX@Z
__wgetmainargs
_cexit
_exit
_controlfp
_except_handler4_common
?terminate@@YAXXZ
wcsrchr
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
ole32
CoDisconnectContext
CoRevokeClassObject
CoSuspendClassObjects
CoCreateInstance
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
CoGetMalloc
CoUninitialize
CoResumeClassObjects
Sections
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE