msninst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db1f77c8268ec959d77e57a5c03d5628_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
db1f77c8268ec959d77e57a5c03d5628_JaffaCakes118
-
Size
205KB
-
MD5
db1f77c8268ec959d77e57a5c03d5628
-
SHA1
9860a27e4b28b562d272243fad746561ca14eeca
-
SHA256
ce845bda2fd33fbb2fc49dcd147bfc62829bef31afc1bd3ef0219ace828eea0e
-
SHA512
9665ef126a2009535c534e6baa20023e6225541c1f88af922621d31caffeabbd5df512d9893701975590790aa700afba4703ae8b8c1b299c3360e61ba07359a0
-
SSDEEP
3072:ewk/MpIT6Klkk8kXRcaCBJoC2VN99EQi2i77xtx8ntOAru:iM26Zk8ZTBJoX96QiL9b8ntOAK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db1f77c8268ec959d77e57a5c03d5628_JaffaCakes118
Files
-
db1f77c8268ec959d77e57a5c03d5628_JaffaCakes118.exe windows:5 windows x86 arch:x86
ab4a78242e30b5066017e7225694cf93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptReleaseContext
kernel32
SetEvent
CreateProcessA
GetPrivateProfileIntA
lstrcpynA
DuplicateHandle
GetCurrentProcess
CreateEventA
MapViewOfFile
CreateFileMappingA
GetModuleFileNameA
EnterCriticalSection
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetStartupInfoA
GetVersionExA
HeapFree
RtlUnwind
TerminateProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualQuery
HeapAlloc
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapSize
GetOEMCP
GetCPInfo
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
InterlockedExchange
ReleaseMutex
CloseHandle
UnmapViewOfFile
LeaveCriticalSection
SetUnhandledExceptionFilter
LocalAlloc
GetCommandLineA
MultiByteToWideChar
GetModuleFileNameW
CreateMutexA
WaitForSingleObject
ExitProcess
lstrlenA
lstrlenW
DeleteFileW
FormatMessageA
LocalFree
FreeLibrary
LoadLibraryA
GetProcAddress
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WideCharToMultiByte
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedCompareExchange
GlobalDeleteAtom
GetSystemDefaultLangID
GetPrivateProfileStringW
FindClose
FindNextFileA
FindFirstFileA
RemoveDirectoryW
FindNextFileW
SetFileAttributesW
FindFirstFileW
InterlockedIncrement
GetWindowsDirectoryA
GlobalAddAtomA
CreateFileW
LocalReAlloc
InterlockedDecrement
GetProcessTimes
QueryPerformanceFrequency
SetFilePointer
GetLocalTime
FlushFileBuffers
GetAtomNameA
lstrcmpA
GetCommandLineW
user32
LoadStringW
LoadStringA
GetSysColor
ReleaseDC
GetDC
SystemParametersInfoW
ExitWindowsEx
RegisterWindowMessageW
MessageBoxA
shfolder
SHGetFolderPathA
gdi32
DeleteObject
GetDeviceCaps
GetPaletteEntries
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE