z:\hotkbd_cs\!KeyCodeTool\Release\KeyCodes.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a7f788eed3d067de030c45ef87d334e5_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a7f788eed3d067de030c45ef87d334e5_JaffaCakes118
-
Size
260KB
-
MD5
a7f788eed3d067de030c45ef87d334e5
-
SHA1
ad1a81bad4c65aa99d5b69206a7205c54feca903
-
SHA256
ef7cedbec08530aa4cd1d3b855b3ef0b4cfb2d5a9386ddb7611099e257120460
-
SHA512
131d52cd9b5e54b395c54f1c63f09dc553d535f5ecfecddfc3066de59a111925962fd9383ba3422e62db7a5a39e8dd4e28912ae7a1bdfc34bfd425e4ee8d7ad1
-
SSDEEP
3072:3FB+ksRJlog7RHvfqsj50DqlO6UPgkwQ/+CczFXPXDmShi4WFZ1qDCXWoO22mMsJ:3FwPH7dfnS+7UZwk+/XyShUco
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7f788eed3d067de030c45ef87d334e5_JaffaCakes118
Files
-
a7f788eed3d067de030c45ef87d334e5_JaffaCakes118.exe windows:4 windows x86 arch:x86
44ddbbe6230ea75d4641465cfa7a5242
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetFileAttributesA
ReadFile
HeapAlloc
UnmapViewOfFile
FlushViewOfFile
SetFilePointer
LocalFree
LocalUnlock
WriteProcessMemory
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetCurrentProcess
LocalLock
LocalAlloc
HeapFree
CreateDirectoryA
DeleteFileA
GetFileAttributesA
FindNextFileA
Sleep
FindFirstFileA
GetLogicalDrives
SetEndOfFile
CreateFileA
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetFileSize
CreateFileMappingA
MapViewOfFile
WriteFile
CloseHandle
GetVersionExA
GetProcessHeap
GetSystemDirectoryA
GetWindowsDirectoryA
CreateThread
GetModuleFileNameA
CreateFileW
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
Process32NextW
OpenProcess
GetExitCodeProcess
Process32FirstW
GetDriveTypeA
FindNextFileW
FindFirstFileW
DeleteFileW
SetFileAttributesW
advapi32
RegisterServiceCtrlHandlerA
ChangeServiceConfigA
StartServiceA
CreateServiceA
OpenServiceA
QueryServiceStatus
SetServiceStatus
RegCreateKeyExA
RegSetValueExA
RegCloseKey
QueryServiceConfigA
AdjustTokenPrivileges
LookupPrivilegeValueA
CloseServiceHandle
OpenSCManagerA
StartServiceCtrlDispatcherA
RegDeleteValueA
OpenProcessToken
shell32
ShellExecuteA
ws2_32
WSAStartup
closesocket
send
sendto
ntohl
htons
htonl
inet_addr
socket
accept
connect
recvfrom
__WSAFDIsSet
select
recv
listen
bind
user32
ExitWindowsEx
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE