d:\programs\siberia2\install\objfre_wxp_x86\i386\Install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d5f161b5ae292faf0c8fabb5a0524778_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5f161b5ae292faf0c8fabb5a0524778_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5f161b5ae292faf0c8fabb5a0524778_JaffaCakes118
-
Size
37KB
-
MD5
d5f161b5ae292faf0c8fabb5a0524778
-
SHA1
33e10fbcad44e7df10c95479b3112c8d29f59fc1
-
SHA256
d4cfe5848e2af534e91cf487a6840bbd2617d464dfe22caf4121e5fe96459962
-
SHA512
87ecc5632d8a893ff2c2228ff696a784069f4e71a252e6f9034727d11a7373ccc4435b09d0b9d92df3620e575b101d541b7d0b61ab56968dd39b92193b127e5d
-
SSDEEP
768:9OVkRKahj+6tKf2QPKcQa2kupkB6G+Jy3RbDBFCF/o:9OVkcUj+9f2QPDSkuqBYg3NCV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5f161b5ae292faf0c8fabb5a0524778_JaffaCakes118
Files
-
d5f161b5ae292faf0c8fabb5a0524778_JaffaCakes118.exe windows:6 windows x86 arch:x86
87d39d4f18671b4e5e56e5164c01eafc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
CloseServiceHandle
StartServiceA
CreateServiceA
OpenServiceA
OpenSCManagerA
RegCloseKey
RegSetValueA
RegCreateKeyA
RegSetValueExA
kernel32
HeapFree
ExitProcess
CreateProcessA
GetEnvironmentVariableA
lstrcatA
GetShortPathNameA
lstrlenA
lstrcpyA
GetCommandLineA
CloseHandle
WriteFile
CreateFileA
QueryPerformanceCounter
GetLastError
Sleep
DeviceIoControl
GetVersionExA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 462B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ