Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
63ee7eaf4aa35f7d52f7a5eabe8f111d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63ee7eaf4aa35f7d52f7a5eabe8f111d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63ee7eaf4aa35f7d52f7a5eabe8f111d_JaffaCakes118
-
Size
265KB
-
MD5
63ee7eaf4aa35f7d52f7a5eabe8f111d
-
SHA1
660b16bb18f15ee90baa6078c222bb7aae762a9a
-
SHA256
222c6e69aefd7eb04c4f761098ec26154cff2589d401522a2e94acdf1c1b7b1d
-
SHA512
d707453e45401b5f700e328f7f4f4b936a58dc3733e95c49c742ff0e4205fa8615868c791ed6e928213f1cbeda2d6aec4852428ba2421c640a811438be708629
-
SSDEEP
3072:LBVPKMQqHulodvQR2XNpNRfQfrCJJDTnRQs4aPhwcfA/ya9U+P+hQ2qSM:lZnXQrCJ95ZPa/ya6ThQ2nM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63ee7eaf4aa35f7d52f7a5eabe8f111d_JaffaCakes118
Files
-
63ee7eaf4aa35f7d52f7a5eabe8f111d_JaffaCakes118.exe windows:6 windows x86 arch:x86
eacf24661341caf95541b2f1f6bea6a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
kernel32
Sleep
GetComputerNameW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetOverlappedResult
GetFileType
GetFileSize
SetErrorMode
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
RaiseException
GetCurrentThreadId
GetPrivateProfileStringW
GetCommandLineW
GetProcAddress
FreeLibrary
LoadLibraryW
DebugBreak
GetExitCodeProcess
ExpandEnvironmentStringsW
GetLocaleInfoW
VirtualAlloc
VirtualFree
GetPrivateProfileIntW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetCurrentDirectoryW
GetEnvironmentVariableW
ResetEvent
CompareStringW
GetModuleHandleW
EnumUILanguagesW
SetEvent
WaitForMultipleObjects
GetFileAttributesW
OpenEventW
CreateEventW
FindResourceW
LockResource
LocalAlloc
DefineDosDeviceW
ReleaseMutex
WaitForSingleObjectEx
MapViewOfFileEx
WritePrivateProfileStringW
GetPrivateProfileSectionW
IsValidLocale
IsValidCodePage
GetSystemDirectoryW
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
LoadResource
FindResourceExW
CreateDirectoryW
GetWindowsDirectoryW
DeleteFileW
DuplicateHandle
CreateThread
SetEndOfFile
SetFileTime
GetVolumeInformationW
WaitForSingleObject
TerminateProcess
ExitProcess
OpenProcess
CreateProcessA
CreateProcessW
FindClose
FindNextFileW
FindFirstFileW
GetTickCount
RemoveDirectoryW
GetShortPathNameW
GetFullPathNameW
GetTempFileNameW
GetTempPathW
GetModuleFileNameW
LoadLibraryExW
CreateMutexW
IsDebuggerPresent
OutputDebugStringW
GetSystemDefaultLangID
GetExitCodeThread
MulDiv
GetCurrentThread
VerSetConditionMask
VerifyVersionInfoW
QueryDosDeviceW
OpenThread
lstrlenW
FormatMessageW
LocalFree
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
CopyFileExW
FlushFileBuffers
DeviceIoControl
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetFilePointer
WriteFile
ReadFile
GetDriveTypeW
GetLogicalDrives
GetLogicalDriveStringsW
CloseHandle
CreateFileW
MoveFileExW
MoveFileW
CopyFileW
GlobalSize
GlobalFree
GlobalUnlock
GetLastError
GlobalLock
GlobalAlloc
HeapWalk
HeapValidate
HeapCompact
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
HeapCreate
GetProcessHeap
GetCurrentProcess
GlobalMemoryStatus
GetSystemInfo
GetVersionExW
GetVersionExA
SetLastError
SetFileAttributesW
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoW
OutputDebugStringA
SetUnhandledExceptionFilter
GetModuleHandleA
user32
GetWindowLongW
PostMessageW
LoadIconW
MessageBoxW
MessageBoxA
CharNextW
DialogBoxParamW
EndDialog
SetForegroundWindow
MsgWaitForMultipleObjects
PeekMessageW
SetTimer
SetThreadDesktop
DispatchMessageW
RegisterClassExW
SetCursor
DestroyWindow
BeginPaint
EndPaint
PostQuitMessage
GetSysColor
DefWindowProcW
GetWindowTextW
CreateWindowExW
SetFocus
LoadImageW
GetClientRect
MapWindowPoints
InvalidateRect
UpdateWindow
SetWindowPos
GetDC
GetSystemMetrics
ReleaseDC
SetWindowTextW
RemovePropW
GetPropW
SetPropW
FindWindowExW
ShowWindow
PostThreadMessageW
RegisterHotKey
GetMessageW
UnregisterHotKey
LoadStringW
CharPrevW
SendMessageW
msvcrt
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_unlock
__dllonexit
_lock
_onexit
memcpy
malloc
free
iswctype
?terminate@@YAXXZ
_controlfp
calloc
isdigit
mbtowc
isleadbyte
isxdigit
localeconv
_snprintf
_itoa
wctomb
ferror
wcstombs
realloc
__badioinfo
__pioinfo
_read
_fileno
wcsrchr
_wcsnicmp
_wtoi
_wcsicmp
towupper
??3@YAXPAX@Z
??2@YAPAXI@Z
wcsstr
wcsncmp
bsearch
ungetc
_isatty
_write
_lseeki64
__wgetmainargs
_iob
__mb_cur_max
_vsnprintf
wcschr
_vsnwprintf
_wcslwr
_errno
__CxxFrameHandler
memset
ntdll
RtlAllocateHeap
RtlFreeHeap
RtlInitUnicodeString
NtOpenDirectoryObject
NtQueryDirectoryObject
NtClose
NtSetInformationFile
NtQuerySystemInformation
NtQueryObject
NtOpenFile
RtlUnwind
RtlNtStatusToDosError
RtlCompareMemory
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
NtOpenKey
NtQueryValueKey
NtWaitForSingleObject
NtDeviceIoControlFile
NtResetEvent
NtCreateEvent
advapi32
RegisterTraceGuidsW
UnregisterTraceGuids
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
SetThreadToken
DuplicateTokenEx
OpenThreadToken
gdi32
TranslateCharsetInfo
DeleteDC
SelectObject
DeleteObject
CreateFontIndirectW
GetDeviceCaps
GetTextExtentPoint32W
SetBkMode
SetBkColor
SetTextColor
SetBrushOrgEx
SetStretchBltMode
CreateCompatibleBitmap
GetObjectW
CreateCompatibleDC
GetStockObject
CreateSolidBrush
BitBlt
AddFontResourceExW
EnumFontFamiliesExW
CreateDCW
StretchBlt
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ptnaxpl Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE