osk.pdb
Behavioral task
behavioral1
Sample
2ed7a5670f360161076758006d2c7ec2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ed7a5670f360161076758006d2c7ec2_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ed7a5670f360161076758006d2c7ec2_JaffaCakes118
-
Size
775KB
-
MD5
2ed7a5670f360161076758006d2c7ec2
-
SHA1
753cba5fc49a1bda5109e95edd5c58faa1d17152
-
SHA256
aee369eacb767eebd07186f37d72f6641e7864a9933923f152cde3174ad23fe4
-
SHA512
71323a6ac27c06de2418bacceeee277d2975f8c8a64e66caa57cb3c5cded6a1be1a7090a81e62431cf228a3112557cd3a17f1b51fd8e78c6ff0e1988a5763b43
-
SSDEEP
6144:N1Jzb0Sw1UoH3AdKy9HGeofJgDEvrIslnCUGw/xIRLtxIRLuovZovriKsW1yNGcr:lYFKjmN+zaoo2ql9N
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ed7a5670f360161076758006d2c7ec2_JaffaCakes118
Files
-
2ed7a5670f360161076758006d2c7ec2_JaffaCakes118.exe windows:6 windows x86 arch:x86
f9815e29854683ef4f5a668c9d2a24f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
EventRegister
EventUnregister
EventWrite
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
RegCloseKey
RegCreateKeyExW
RegSetValueExW
TraceMessage
RegOpenKeyExW
RegQueryValueExW
RegDeleteValueW
RegGetValueW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
kernel32
WaitForSingleObject
SetEvent
GetProcAddress
LoadLibraryW
FreeLibrary
CreateThread
CreateEventW
Sleep
GetStringTypeExW
GetSystemDefaultLangID
IsProcessInJob
GetCurrentProcess
DelayLoadFailureHook
InterlockedCompareExchange
LoadLibraryExA
GlobalDeleteAtom
GlobalAddAtomW
GetModuleFileNameW
LoadResource
GetTickCount64
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
LockResource
RegisterApplicationRestart
FreeResource
FindResourceExW
LCIDToLocaleName
GetLocaleInfoEx
ResolveLocaleName
LocaleNameToLCID
GetUserPreferredUILanguages
LoadLibraryExW
GetTickCount
MulDiv
GetCurrentProcessId
ProcessIdToSessionId
ExpandEnvironmentStringsW
RaiseException
lstrlenW
GetProcessHeap
HeapAlloc
CreateMutexW
GetLastError
HeapSetInformation
SetProcessShutdownParameters
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
GetAtomNameW
DeleteCriticalSection
InitializeCriticalSection
EncodePointer
DecodePointer
GetUserGeoID
DebugBreak
EnterCriticalSection
LeaveCriticalSection
CompareStringOrdinal
GetLocaleInfoW
HeapFree
FindResourceW
SizeofResource
DeactivateActCtx
ActivateActCtx
ReleaseActCtx
CreateActCtxW
GetModuleHandleW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedExchange
CloseHandle
gdi32
DeleteDC
TextOutW
DeleteObject
SelectObject
CreateFontIndirectW
PatBlt
SetBkMode
SetTextAlign
SetTextColor
BitBlt
RestoreDC
SelectClipRgn
SaveDC
OffsetRgn
CreateRoundRectRgn
SetStretchBltMode
GetStretchBltMode
SetPixel
CombineRgn
CreateDIBSection
CreateCompatibleDC
StretchBlt
GetObjectW
GetStockObject
GetDeviceCaps
GdiAlphaBlend
user32
UnregisterClassA
RedrawWindow
OffsetRect
SetRectEmpty
IsRectEmpty
InvalidateRect
CharUpperBuffW
SendMessageW
KillTimer
SystemParametersInfoW
LoadStringW
FindWindowW
IsIconic
CreateWindowExW
SetTimer
ScreenToClient
GetCursorPos
LoadImageW
PostMessageW
LoadCursorW
GetCursorInfo
GetGUIThreadInfo
MapVirtualKeyExW
GetParent
GetClassNameW
WindowFromPhysicalPoint
PtInRect
ReleaseDC
ShowWindow
SetForegroundWindow
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
DestroyWindow
PeekMessageW
SetWindowPos
GetWindowMinimizeRect
CreateDialogParamW
GetDC
GetWindowThreadProcessId
GetWindowLongW
GetPropW
GetForegroundWindow
GetKeyState
ChangeWindowMessageFilterEx
RegisterClassW
DefWindowProcW
PostQuitMessage
SetWindowLongW
DialogBoxParamW
SetDlgItemTextW
EndDialog
MessageBoxW
SetFocus
SendDlgItemMessageW
CheckDlgButton
EnableWindow
GetDlgItem
RemovePropW
LoadIconW
SetClassLongW
SetPropW
GetMessageExtraInfo
SendInput
AllowSetForegroundWindow
IsWindow
MonitorFromPoint
SetWindowPlacement
GetDoubleClickTime
GetWindowRect
AdjustWindowRectEx
GetSystemMetrics
SetWindowsHookExW
SetWinEventHook
GetKeyboardLayout
GetSysColor
CallNextHookEx
UnhookWinEvent
UnhookWindowsHookEx
MapWindowPoints
GetClientRect
msvcrt
_wtoi
_itow
wcstok_s
wcstol
floor
_ftol2_sse
__CxxFrameHandler3
memcpy
_purecall
malloc
??3@YAXPAX@Z
_CxxThrowException
_controlfp
_unlock
__dllonexit
_lock
_onexit
memcpy_s
wcsstr
calloc
free
memmove_s
memset
??2@YAPAXI@Z
??_U@YAPAXI@Z
wcstoul
_vsnwprintf
__wgetmainargs
_cexit
_exit
_XcptFilter
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
_ftol2
_wcsicmp
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
??_V@YAXPAX@Z
msswch
ord10
ord9
ord11
ord12
ord8
ord7
ord14
ord1
ord13
dwmapi
DwmExtendFrameIntoClientArea
DwmIsCompositionEnabled
DwmSetWindowAttribute
gdiplus
GdipCreateBitmapFromStream
GdipDisposeImage
GdipCreateBitmapFromStreamICM
GdipFillRectangleI
GdipDrawLineI
GdiplusStartup
GdiplusShutdown
GdipDrawImageRectI
GdipCloneImage
GdipCreateHatchBrush
GdipCloneBrush
GdipCreateFromHDC
GdipSetPenColor
GdipCreateSolidFill
GdipDeleteGraphics
GdipDeletePen
GdipCreatePen1
GdipSetSolidFillColor
GdipDeleteBrush
GdipFree
GdipAlloc
ntdll
WinSqmSetDWORD
WinSqmIsOptedIn
WinSqmIncrementDWORD
ole32
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemFree
oleacc
AccessibleObjectFromWindow
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VarBstrCmp
shlwapi
PathFindFileNameW
wmsgapi
WmsgSendMessage
duser
InvalidateGadget
uxtheme
IsThemeActive
Sections
.text Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 468KB - Virtual size: 467KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE