DRMGLPlay
Static task
static1
Behavioral task
behavioral1
Sample
a8b4a141a7120fd64a342e566ce0c9d3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8b4a141a7120fd64a342e566ce0c9d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
fxCommsEnum.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
fxCommsEnum.dll
Resource
win10v2004-20240802-en
General
-
Target
a8b4a141a7120fd64a342e566ce0c9d3_JaffaCakes118
-
Size
127KB
-
MD5
a8b4a141a7120fd64a342e566ce0c9d3
-
SHA1
44d10673cdb7b08e2d54319f5a6420b64a0e4428
-
SHA256
6a4c693bcadf1a6ac68458d5b581cd174d56d8f65639601c79c019eedf08e040
-
SHA512
6f2c03ba7ee09a5a02ea378a458db4f66057718e4c4a590bcd16ef3b2066df4339e7daa2419065e3d6e4383cad9805f8428bfd5acb207fd059e6b9ad69eb420a
-
SSDEEP
1536:cluDlqUqdwsaLdVJ7HJ3JTMNNteFkzJX9R37eZqRni7q3GCii2C45WnY0zOELy1z:tpqUqOtLdVdp3JTMNT2y91ZRrptjLKN
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource a8b4a141a7120fd64a342e566ce0c9d3_JaffaCakes118 unpack001/fxCommsEnum.dll -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_2
Files
-
a8b4a141a7120fd64a342e566ce0c9d3_JaffaCakes118.exe windows:4 windows x86 arch:x86
28a099a911237a28521d8b7ea250f089
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControls
gdi32
CreateBrushIndirect
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SelectObject
SetBkColor
SetBkMode
SetTextColor
kernel32
CloseHandle
CompareFileTime
CopyFileA
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LoadLibraryExA
MoveFileA
MulDiv
MultiByteToWideChar
ReadFile
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
Sleep
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
ole32
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
shell32
SHBrowseForFolderA
SHFileOperationA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
user32
AppendMenuA
BeginPaint
CallWindowProcA
CharNextA
CharPrevA
CheckDlgButton
CloseClipboard
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
FindWindowExA
GetClassInfoA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetMessagePos
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
LoadBitmapA
LoadCursorA
LoadImageA
MessageBoxIndirectA
OpenClipboard
PeekMessageA
PostQuitMessage
RegisterClassA
ScreenToClient
SendMessageA
SendMessageTimeoutA
SetClassLongA
SetClipboardData
SetCursor
SetDlgItemTextA
SetForegroundWindow
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 1024B - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
fxCommsEnum.dll.dll windows:4 windows x86 arch:x86
fd4a8a2eff9ccef74c8bf039ca03b50f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ReadProcessMemory
CreateProcessA
GetLastError
InterlockedCompareExchange
CreateFileMappingA
GetProcessHeap
CreateEventA
InterlockedDecrement
LoadLibraryA
WriteProcessMemory
Sleep
HeapAlloc
GetModuleHandleA
UnmapViewOfFile
LocalFree
GlobalAlloc
HeapFree
TerminateProcess
CreateFileA
WriteFile
GetCommandLineA
GetProcAddress
OpenFileMappingA
LeaveCriticalSection
OpenEventA
MapViewOfFile
GetComputerNameA
GlobalFree
InterlockedIncrement
GetVolumeInformationA
WaitForSingleObject
GetModuleFileNameA
GetTickCount
CloseHandle
GetCurrentProcess
ExitProcess
CreateDirectoryA
EnterCriticalSection
CreateMutexW
SetLastError
CopyFileA
ole32
CoSetProxyBlanket
CoCreateInstance
OleCreate
CoInitialize
OleSetContainedObject
CoUninitialize
CoCreateGuid
CoTaskMemAlloc
user32
ScreenToClient
TranslateMessage
GetWindow
GetWindowThreadProcessId
DestroyWindow
SetWindowLongA
GetSystemMetrics
SetWindowsHookExA
GetCursorPos
UnhookWindowsHookEx
DefWindowProcA
GetClassNameA
PostQuitMessage
GetParent
DispatchMessageA
GetMessageA
PeekMessageA
SendMessageA
ClientToScreen
GetWindowLongA
CreateWindowExA
RegisterWindowMessageA
SetTimer
KillTimer
FindWindowA
oleaut32
SysFreeString
SysAllocString
SysAllocStringLen
SysStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegDeleteKeyA
GetUserNameA
RegCloseKey
RegDeleteValueA
RegSetValueExA
SetTokenInformation
RegCreateKeyExA
DuplicateTokenEx
RegOpenKeyExA
OpenProcessToken
RegQueryValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
scgpelj Size: 4KB - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ