c:\mmp\source\setup\IEKeyword_EXE\setup\IEKeyword_EXE\Release\setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
61e3e1ca1917ced2060d3abb8cb10037_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61e3e1ca1917ced2060d3abb8cb10037_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61e3e1ca1917ced2060d3abb8cb10037_JaffaCakes118
-
Size
207KB
-
MD5
61e3e1ca1917ced2060d3abb8cb10037
-
SHA1
cbe7c33157bc165e4053f8cd20f27cdb7ca36dd4
-
SHA256
9750ed8524efb3a26cc444b22a799110c853b397f805f68031961fea88d945da
-
SHA512
0e17bb303fa709cec511c72cf2dba790513088f78595b7a484a31df780feb7631daba92234fc5fb56711d02990a88997c969b2bbe75bb8346bc7674ba8359739
-
SSDEEP
3072:A62cGV1rzPN0vzmvitBJhzNbKhWL/4j5afidqbhF:Z2ezNtBJhzdKhEA4fisF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61e3e1ca1917ced2060d3abb8cb10037_JaffaCakes118
Files
-
61e3e1ca1917ced2060d3abb8cb10037_JaffaCakes118.exe windows:5 windows x86 arch:x86
fda18323696d5cc409b645e632c24308
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEvent
WideCharToMultiByte
lstrlenW
GetModuleFileNameA
SetLastError
GetLastError
lstrcmpA
MulDiv
CloseHandle
CreateRemoteThread
GetProcAddress
GetExitCodeProcess
DuplicateHandle
lstrcatA
lstrcpyA
ExpandEnvironmentStringsA
GetTickCount
lstrcmpiA
CreateMutexA
RemoveDirectoryA
CreateDirectoryA
GetTempPathA
GetCurrentProcessId
OpenProcess
MoveFileA
DeleteFileA
GetCommandLineA
GetLocalTime
IsProcessorFeaturePresent
InterlockedCompareExchange
ReadFile
GetProcessHeap
SetEndOfFile
GetLocaleInfoA
InterlockedDecrement
GetStringTypeW
GetStringTypeA
LoadLibraryA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
CreateFileA
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
VirtualFree
HeapCreate
GetConsoleMode
GetConsoleCP
WriteFile
GetStartupInfoA
ResumeThread
InterlockedIncrement
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
GetModuleHandleA
GetCurrentThreadId
Sleep
GetCurrentProcess
GetFileAttributesExA
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
MultiByteToWideChar
WaitForSingleObject
CreateThread
HeapFree
HeapAlloc
ExitThread
HeapReAlloc
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
user32
GetWindowLongA
SetWindowLongA
SendMessageA
GetClassInfoExA
LoadCursorA
DefWindowProcA
SetWindowTextA
MoveWindow
ClientToScreen
SetWindowPos
IsWindowVisible
ShowWindow
GetWindowTextA
GetWindowTextLengthA
PostThreadMessageA
CreateWindowExA
RegisterClassExA
RegisterWindowMessageA
LoadBitmapA
GetClientRect
BeginPaint
EndPaint
CallWindowProcA
FillRect
GetSysColor
CharNextA
wsprintfA
MessageBoxA
BringWindowToTop
PeekMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
GetWindowThreadProcessId
AttachThreadInput
GetCursorPos
GetForegroundWindow
WindowFromPoint
SetLayeredWindowAttributes
GetWindowRect
CreateAcceleratorTableA
IsWindow
GetDesktopWindow
SetFocus
GetFocus
GetWindow
DestroyAcceleratorTable
DestroyWindow
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
UnregisterClassA
gdi32
GetDeviceCaps
CreateCompatibleBitmap
DeleteObject
GetStockObject
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetObjectA
CreateSolidBrush
advapi32
RegDeleteValueA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
ole32
CoInitializeEx
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoTaskMemAlloc
OleLockRunning
StringFromGUID2
CoCreateInstance
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocString
VariantInit
VariantClear
DispCallFunc
LoadRegTypeLi
LoadTypeLi
OleCreateFontIndirect
shlwapi
PathIsDirectoryA
PathRemoveBlanksA
PathRemoveFileSpecA
PathGetArgsA
StrStrIW
StrToIntA
UrlUnescapeA
PathFileExistsA
PathFindFileNameA
ws2_32
htons
ioctlsocket
connect
select
__WSAFDIsSet
closesocket
send
recv
gethostbyname
WSAStartup
socket
netapi32
Netbios
psapi
EnumProcesses
GetModuleFileNameExA
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ