d:\ieki\sap\taiken_sonic_setup\installer\eu\installer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d3838a3c3fd95b5c76a5acef8b1f78eb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3838a3c3fd95b5c76a5acef8b1f78eb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3838a3c3fd95b5c76a5acef8b1f78eb_JaffaCakes118
-
Size
560KB
-
MD5
d3838a3c3fd95b5c76a5acef8b1f78eb
-
SHA1
a68911ba5a80b579a26405ce370a09bc011b27dc
-
SHA256
bbbfe2617fd7a109e3b3b2ff458fb034e4fd1a391eef17e5675af9b3e2db2f25
-
SHA512
3ee1d26afe3d120a0ac6877f1fdb5b5048f7452c07d97bfbdad99cec0ea1429f52184f17d15ecd40599f5326d39da56a92b9506d3b677c9d0798b1f7e139bacb
-
SSDEEP
6144:85YfnZX41llZwcX9DpQjDKpqlzwpn/WjaE/AbJXnX9DpQjDKpqlzwpn/WjaE/YLX:xZb//6qlzEneuE8XQ/6qlzEneuEQLX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3838a3c3fd95b5c76a5acef8b1f78eb_JaffaCakes118
Files
-
d3838a3c3fd95b5c76a5acef8b1f78eb_JaffaCakes118.exe windows:4 windows x86 arch:x86
450cf03dfd84a362b782addd54030afc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WritePrivateProfileStringA
CreateDirectoryA
GetDriveTypeA
FindClose
FindFirstFileA
MultiByteToWideChar
GetVolumeInformationA
GetPrivateProfileIntA
GetProcAddress
LoadLibraryA
GetCurrentProcess
lstrcmpA
ReadFile
SetFilePointer
lstrcpynA
lstrcmpiA
HeapAlloc
HeapCreate
HeapReAlloc
HeapDestroy
HeapFree
HeapSize
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
CreateMutexA
VirtualQuery
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetTimeZoneInformation
InitializeCriticalSection
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
UnhandledExceptionFilter
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
ReleaseMutex
GetVersionExA
GetLogicalDriveStringsA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetModuleFileNameA
GetTempPathA
lstrcpyA
MulDiv
GetTickCount
GetLastError
CopyFileA
GetFileSize
DeleteFileA
RemoveDirectoryA
Sleep
lstrlenA
SetFileAttributesA
CreateFileA
WriteFile
GetWindowsDirectoryA
WaitForSingleObject
ResetEvent
SetEvent
CloseHandle
CreateEventA
TlsAlloc
SetLastError
TlsFree
GetCPInfo
GetOEMCP
GetACP
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToLocalFileTime
ExitProcess
RtlUnwind
RaiseException
ExitThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
CreateThread
FileTimeToSystemTime
SetEnvironmentVariableA
user32
GetWindowRect
SetWindowPos
SendMessageA
GetDlgItem
MessageBoxA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetDesktopWindow
PostQuitMessage
DestroyWindow
DefWindowProcA
MoveWindow
DialogBoxParamA
EndDialog
GetWindowLongA
UpdateWindow
CallWindowProcA
GetClientRect
DrawTextA
IsWindow
SetWindowLongA
GetSysColor
BeginPaint
EndPaint
wsprintfA
LoadImageA
ScreenToClient
InvalidateRect
ShowWindow
GetWindowTextA
FindWindowA
ClientToScreen
PostMessageA
SetWindowTextA
gdi32
GetStockObject
SetBkMode
CreateRectRgn
SelectClipRgn
SetTextColor
SetBkColor
ExtTextOutA
GetObjectA
CreateCompatibleDC
SelectObject
BitBlt
CreateSolidBrush
DeleteObject
DeleteDC
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
CoTaskMemFree
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 444KB - Virtual size: 444KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE