d:\Projects\WinRAR\uninstall\build\uninstall32\Release\uninstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3fa297a8d7c6ee5b9adaa5ee28f62c35_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3fa297a8d7c6ee5b9adaa5ee28f62c35_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3fa297a8d7c6ee5b9adaa5ee28f62c35_JaffaCakes118
-
Size
119KB
-
MD5
3fa297a8d7c6ee5b9adaa5ee28f62c35
-
SHA1
61a5b7dd16932ca079fc5490bdde017625b58416
-
SHA256
7790986643a3e24c7201240ec75f189a098b003692e5f008df338036e277610d
-
SHA512
58602638bfea84442748ff2dcfc2a2355e00ff096fbef503ed64c6df68d2e0c0e583bba7334a450bc0548aa98be0f68b74ea1e86493bd8ba00f69272f908c46a
-
SSDEEP
3072:zFM+iClQ0YyYoDg89H5mXB5ONLHIJlIaiYGPH:BXiCGxho7H5G4kIpv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fa297a8d7c6ee5b9adaa5ee28f62c35_JaffaCakes118
Files
-
3fa297a8d7c6ee5b9adaa5ee28f62c35_JaffaCakes118.exe windows:5 windows x86 arch:x86
776936c154d35c96a366bb33f4284717
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteFileW
CreateDirectoryA
GetCurrentProcess
GetModuleFileNameA
MultiByteToWideChar
GetVersionExA
FindResourceA
FreeLibrary
ExpandEnvironmentStringsA
LoadLibraryA
LoadLibraryExA
CompareStringA
WideCharToMultiByte
IsDBCSLeadByte
GetCPInfo
GetCurrentDirectoryA
CopyFileA
GetEnvironmentVariableA
CreateProcessA
GetTempPathA
WritePrivateProfileStringA
GetShortPathNameA
GetWindowsDirectoryA
MoveFileExA
RemoveDirectoryA
SetCurrentDirectoryA
Sleep
DeleteFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
InitializeCriticalSectionAndSpinCount
GetVersion
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ExitProcess
MoveFileA
SetFileAttributesA
GetFileAttributesW
GetFileAttributesA
GetModuleHandleA
GetProcAddress
WriteFile
SetLastError
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetEndOfFile
SetFilePointer
GetLastError
FlushFileBuffers
GetProcessHeap
CloseHandle
GetModuleHandleW
HeapCreate
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
HeapReAlloc
LeaveCriticalSection
RaiseException
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
SetStdHandle
EnterCriticalSection
user32
GetDlgItem
EnableWindow
ReleaseDC
LoadIconA
MessageBoxA
SetForegroundWindow
GetSysColor
SendDlgItemMessageA
SetDlgItemTextA
GetDC
LoadStringA
GetWindowRect
GetClientRect
SetWindowPos
GetWindowTextA
SetWindowTextA
GetSystemMetrics
GetWindow
GetClassNameA
GetWindowLongA
SetWindowLongA
DialogBoxParamA
EndDialog
CheckDlgButton
IsDlgButtonChecked
GetParent
SendMessageA
InvalidateRect
gdi32
CreateFontA
DeleteObject
GetDeviceCaps
advapi32
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHChangeNotify
SHFileOperationA
ole32
OleUninitialize
OleInitialize
CoCreateInstance
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE