e:\builds\moz2_slave\rel-m-rel-w32-bld\build\obj-firefox\toolkit\mozapps\update\updater\updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b77491f2e58312e195a89f89becb05ba_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b77491f2e58312e195a89f89becb05ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b77491f2e58312e195a89f89becb05ba_JaffaCakes118
-
Size
328KB
-
MD5
b77491f2e58312e195a89f89becb05ba
-
SHA1
da07a7098cfd684b18b5e466355ae6a057c60bf4
-
SHA256
fc10059fb538449e8c86df204ba004716a0ec2651393310caefaebd2b32743b6
-
SHA512
af3438204a24a94143244ef110c0645ce1bc55adf281557882f3a746d45b5145b79a5c9142a995e87f42f3e34791c4bf724b49791d1d9ca46899408cf3ff3dd0
-
SSDEEP
6144:BhpXDLb08z8Navhrufq03e3PfcKrKywAw5sS1JsA8E:BhpTLTz8NsqWdGyq5d1J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b77491f2e58312e195a89f89becb05ba_JaffaCakes118
Files
-
b77491f2e58312e195a89f89becb05ba_JaffaCakes118.exe windows:4 windows x86 arch:x86
341af390ec5df9ff39a1e9b0d7274a6e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEndOfFile
FindNextFileW
CreateFileW
CreateProcessW
GetPrivateProfileStringW
CloseHandle
MultiByteToWideChar
OpenProcess
MoveFileExW
LocalFree
GetLastError
WideCharToMultiByte
GetLongPathNameW
GetModuleHandleW
GetModuleFileNameW
CompareStringA
SetFilePointer
FindFirstFileW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
InitializeCriticalSection
LoadLibraryA
FormatMessageW
FlushFileBuffers
WaitForSingleObject
FindClose
GetTempFileNameW
CopyFileW
WriteConsoleW
Sleep
RaiseException
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
SetFileAttributesW
GetFileAttributesW
MoveFileW
EnterCriticalSection
LeaveCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
RemoveDirectoryW
GetDriveTypeW
DeleteFileW
HeapReAlloc
GetDriveTypeA
CreateFileA
GetProcAddress
GetModuleHandleA
ExitProcess
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
GetConsoleCP
GetConsoleMode
HeapSize
ReadFile
RtlUnwind
SetEnvironmentVariableA
GetFullPathNameW
GetCurrentDirectoryA
CompareStringW
user32
SetTimer
GetClientRect
GetDC
LoadIconW
OffsetRect
ReleaseDC
GetDlgItem
EndDialog
GetParent
SetWindowPos
GetDesktopWindow
ScreenToClient
GetWindowRect
SendMessageW
DrawTextW
SetWindowTextW
DialogBoxParamW
CopyRect
gdi32
SelectObject
wsock32
ntohl
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
comctl32
InitCommonControlsEx
shell32
ShellExecuteExW
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE