c:\mmp\source\setup\IEKeyword_EXE\setup\IEKeyword_EXE\Release\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
08393aa665b189bfaded7eda03cc80ae_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
08393aa665b189bfaded7eda03cc80ae_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
08393aa665b189bfaded7eda03cc80ae_JaffaCakes118
-
Size
208KB
-
MD5
08393aa665b189bfaded7eda03cc80ae
-
SHA1
ab56f455abd9d4a9125e4aeeaea18e31d0e07db4
-
SHA256
f657a919dffa5362c0ad5b705d0115089a0349d9482b093959366a7ed48bec0c
-
SHA512
7e23f76b02d9e277695542c5046a532c8eca390840970456e799de8248cf22393228848b4e488039ff061e066216692f3b417825a56bf834e832f9b25b83e6c1
-
SSDEEP
3072:faEYsyz5i5YzYdS6+DYbpaZP0laL67d7zWc1j5yUHr9xv0:SEsJ6bbpaZP+ae7d7zWGIULb8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08393aa665b189bfaded7eda03cc80ae_JaffaCakes118
Files
-
08393aa665b189bfaded7eda03cc80ae_JaffaCakes118.exe windows:5 windows x86 arch:x86
fda18323696d5cc409b645e632c24308
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEvent
WideCharToMultiByte
lstrlenW
GetModuleFileNameA
SetLastError
GetLastError
lstrcmpA
MulDiv
CloseHandle
CreateRemoteThread
GetProcAddress
GetExitCodeProcess
DuplicateHandle
lstrcatA
lstrcpyA
ExpandEnvironmentStringsA
GetTickCount
lstrcmpiA
CreateMutexA
RemoveDirectoryA
CreateDirectoryA
GetTempPathA
GetCurrentProcessId
OpenProcess
MoveFileA
DeleteFileA
GetCommandLineA
GetLocalTime
IsProcessorFeaturePresent
InterlockedCompareExchange
ReadFile
GetProcessHeap
SetEndOfFile
GetLocaleInfoA
InterlockedDecrement
GetStringTypeW
GetStringTypeA
LoadLibraryA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
CreateFileA
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
VirtualFree
HeapCreate
GetConsoleMode
GetConsoleCP
WriteFile
GetStartupInfoA
ResumeThread
InterlockedIncrement
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
GetModuleHandleA
GetCurrentThreadId
Sleep
GetCurrentProcess
GetFileAttributesExA
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
MultiByteToWideChar
WaitForSingleObject
CreateThread
HeapFree
HeapAlloc
ExitThread
HeapReAlloc
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
user32
GetWindowLongA
SetWindowLongA
SendMessageA
GetClassInfoExA
LoadCursorA
DefWindowProcA
SetWindowTextA
MoveWindow
ClientToScreen
SetWindowPos
IsWindowVisible
ShowWindow
GetWindowTextA
GetWindowTextLengthA
PostThreadMessageA
CreateWindowExA
RegisterClassExA
RegisterWindowMessageA
LoadBitmapA
GetClientRect
BeginPaint
EndPaint
CallWindowProcA
FillRect
GetSysColor
CharNextA
wsprintfA
MessageBoxA
BringWindowToTop
PeekMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
GetWindowThreadProcessId
AttachThreadInput
GetCursorPos
GetForegroundWindow
WindowFromPoint
SetLayeredWindowAttributes
GetWindowRect
CreateAcceleratorTableA
IsWindow
GetDesktopWindow
SetFocus
GetFocus
GetWindow
DestroyAcceleratorTable
DestroyWindow
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
UnregisterClassA
gdi32
GetDeviceCaps
CreateCompatibleBitmap
DeleteObject
GetStockObject
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetObjectA
CreateSolidBrush
advapi32
RegDeleteValueA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
ole32
CoInitializeEx
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoTaskMemAlloc
OleLockRunning
StringFromGUID2
CoCreateInstance
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocString
VariantInit
VariantClear
DispCallFunc
LoadRegTypeLi
LoadTypeLi
OleCreateFontIndirect
shlwapi
PathIsDirectoryA
PathRemoveBlanksA
PathRemoveFileSpecA
PathGetArgsA
StrStrIW
StrToIntA
UrlUnescapeA
PathFileExistsA
PathFindFileNameA
ws2_32
htons
ioctlsocket
connect
select
__WSAFDIsSet
closesocket
send
recv
gethostbyname
WSAStartup
socket
netapi32
Netbios
psapi
EnumProcesses
GetModuleFileNameExA
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ