E:\makalu\3dswin\installer\Common\src\setup_exe\Release\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
04453da3e6f0f7991cec2b34116ce075_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04453da3e6f0f7991cec2b34116ce075_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04453da3e6f0f7991cec2b34116ce075_JaffaCakes118
-
Size
144KB
-
MD5
04453da3e6f0f7991cec2b34116ce075
-
SHA1
0daf31df7fca7aec95a778199eb0bad079ab847d
-
SHA256
a9f9f4dd85db29d6bfba054dacc7de4d07469cd7d9d3f6f097f60b74d32091c7
-
SHA512
ba4434e3647e3d7ea45c97884da0562425ce8efd6e5959e17fff9506994d1e39fdae1f11e9b32e491a28c9c3152b04e1387c0462491a474894c54d8dec632b99
-
SSDEEP
3072:j0PVAqOobZx1CbT3pWIRjKt+zu7PDPPP1:jsbP1C/RdKbDP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04453da3e6f0f7991cec2b34116ce075_JaffaCakes118
Files
-
04453da3e6f0f7991cec2b34116ce075_JaffaCakes118.exe windows:4 windows x86 arch:x86
8d4685e7ceda4cdd69dec5ae3a3d9453
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
PDB Paths
Imports
comctl32
InitCommonControlsEx
shlwapi
PathUnquoteSpacesW
PathFindExtensionW
PathStripPathW
PathRemoveFileSpecW
StrChrW
PathAppendW
PathRenameExtensionW
PathFileExistsW
PathIsRelativeW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shell32
SHGetFolderPathW
msi
ord8
ord160
ord159
ord32
ord118
ord92
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
GetLocaleInfoA
lstrcmpiW
lstrcpyW
lstrlenW
lstrcpynW
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetPrivateProfileIntW
LoadLibraryW
FreeLibrary
GetProcAddress
ExpandEnvironmentStringsW
GetTempFileNameW
GetTempPathW
GetCurrentProcess
GetVersionExW
CloseHandle
lstrcmpW
GetLastError
CreateMutexW
GlobalFree
GlobalAlloc
GetSystemDirectoryW
GetFileAttributesW
WriteFile
GetLocalTime
GetComputerNameW
SetFilePointer
ReadFile
FlushFileBuffers
Sleep
MoveFileExW
CreateThread
CreateEventW
lstrcatW
GetExitCodeProcess
CreateProcessW
VerifyVersionInfoW
VerSetConditionMask
GetModuleFileNameW
GetModuleHandleW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
InitializeCriticalSection
LoadLibraryA
IsDebuggerPresent
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
CreateFileW
GetModuleHandleA
ExitProcess
RtlUnwind
CreateDirectoryW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
GetDlgItem
SendMessageW
IsDialogMessageW
SetDlgItemTextW
DestroyWindow
MessageBoxW
wsprintfW
SystemParametersInfoW
TranslateMessage
DispatchMessageW
MsgWaitForMultipleObjects
PeekMessageW
GetSystemMetrics
LoadStringW
ShowWindow
GetWindowRect
SetCursor
LoadCursorW
LoadIconW
SetForegroundWindow
SetFocus
MoveWindow
SetWindowTextW
CreateDialogParamW
DialogBoxParamW
ExitWindowsEx
EndDialog
advapi32
RegEnumKeyW
RegSetValueExW
GetUserNameW
RegQueryValueExW
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
M% Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE