d:\Nomnal\new_iemon\release\bin\IEMon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
296c6437efd0465e1a36f740238af9b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
296c6437efd0465e1a36f740238af9b5_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
296c6437efd0465e1a36f740238af9b5_JaffaCakes118
-
Size
336KB
-
MD5
296c6437efd0465e1a36f740238af9b5
-
SHA1
070748dac6f37736b255e9ddeaaaa4302fe06097
-
SHA256
25f6c8f8db349e412f5ce7158230ef92639a09a1ee3897b679d6f60948be22f0
-
SHA512
a8c36caee0339d245bb8ca2cdc3315a0698ef60394ed086f99c25137e4d43dd2bc437a9c807a5f3cb53516842bc7cd3b645079cb33afe61d5f39ebdccd6c71b5
-
SSDEEP
6144:lFtt75oQdxp2x4lk/22r2yZbL2+3TDGiVUPfPmL7OG+MqJseDeeeeeeeeeeeeeee:vjdrl6HNXbVgfOP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 296c6437efd0465e1a36f740238af9b5_JaffaCakes118
Files
-
296c6437efd0465e1a36f740238af9b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
bf0886984f8f9de6686bd19658303287
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
FindClose
FindFirstFileW
GetVolumeInformationW
GetFullPathNameW
CreateFileW
GetFileTime
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetProcessHeap
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RaiseException
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
ExitThread
CreateThread
HeapSize
GetTimeZoneInformation
GetACP
GetOEMCP
GetTimeFormatA
GetDateFormatA
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
InterlockedCompareExchange
GetModuleHandleA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GlobalAddAtomW
GlobalFindAtomW
LoadLibraryA
GetVersionExA
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
SetErrorMode
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GlobalDeleteAtom
SetLastError
GlobalFree
GlobalAlloc
InterlockedIncrement
GetUserDefaultLCID
FileTimeToSystemTime
GetThreadLocale
GlobalLock
GlobalUnlock
lstrlenA
CompareStringW
FreeLibrary
GetCurrentProcessId
LoadLibraryW
ReadFile
GetFileSize
OpenFile
SetFileAttributesW
GetFileAttributesW
WideCharToMultiByte
LocalFree
TerminateProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
WaitForSingleObject
GetProcAddress
ReadProcessMemory
GetVersion
OpenProcess
CreateProcessA
GetModuleFileNameA
CreateProcessW
Sleep
GetSystemDirectoryW
GetPrivateProfileStringW
FormatMessageW
lstrlenW
LocalAlloc
InterlockedDecrement
GetModuleHandleW
GetCommandLineW
GetModuleFileNameW
GetLastError
CloseHandle
GetCurrentProcess
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
WritePrivateProfileStringW
GetCPInfo
GetPrivateProfileIntW
user32
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetCursor
LoadCursorW
GetDC
ReleaseDC
GetSysColorBrush
ClientToScreen
ShowWindow
SetWindowTextW
RegisterWindowMessageW
LoadIconW
WinHelpW
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
wsprintfW
GetWindowThreadProcessId
UnregisterClassA
MessageBoxW
CheckMenuItem
EnableMenuItem
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
CharUpperW
DestroyMenu
GetTopWindow
GetMenuState
ModifyMenuW
SendMessageW
GetParent
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindowTextW
GetSubMenu
GetMenuItemCount
GetMenuItemID
PostQuitMessage
PostMessageW
EnableWindow
IsWindowEnabled
GetLastActivePopup
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
GetWindowLongW
GetCapture
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetViewportOrgEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
SetTextColor
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
CreateBitmap
GetDeviceCaps
GetClipBox
OffsetViewportOrgEx
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegQueryValueW
RegEnumKeyW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyA
RegQueryValueExA
RegDeleteKeyW
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegOpenKeyW
shell32
SHGetDesktopFolder
SHGetDataFromIDListW
SHGetMalloc
ShellExecuteW
shlwapi
PathFindFileNameW
UrlUnescapeW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
ole32
OleRun
CoDisconnectObject
CoInitializeEx
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocStringLen
VariantCopy
VariantChangeType
VariantClear
SysStringLen
LoadTypeLi
VariantInit
SysAllocString
GetErrorInfo
wininet
InternetOpenUrlW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetQueryOptionW
InternetQueryDataAvailable
Sections
.text Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ