e:\App\web\Dll\kwxf\web\Debug\web.pdb
Static task
static1
Behavioral task
behavioral1
Sample
afd8700e3b557e3d05678842a2ed8562_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
afd8700e3b557e3d05678842a2ed8562_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
afd8700e3b557e3d05678842a2ed8562_JaffaCakes118
-
Size
300KB
-
MD5
afd8700e3b557e3d05678842a2ed8562
-
SHA1
cd1c79d97d7755fd7872caa0fc0e6d5038c9577b
-
SHA256
a3d132604c79188eb83c4aa89948a11d274c406ee16b56da42183b043dc30e65
-
SHA512
41b85d7479fbc2eecb883a05e21896edde09ab8fa4b2507320767123a45489da68e37e3fb191ef5e66252b7ffdfe81f84487c2cb1aacfa9eaa2c7c64c1f367a7
-
SSDEEP
6144:CjMcrhssBCTzkmX51ECBPi/C0gkjp3kkSg:KMc9sTtX51ECBa/027S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afd8700e3b557e3d05678842a2ed8562_JaffaCakes118
Files
-
afd8700e3b557e3d05678842a2ed8562_JaffaCakes118.exe windows:4 windows x86 arch:x86
e3e878c3595e23d1ff15b31edc50f327
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Process32First
CreateToolhelp32Snapshot
WinExec
GetFileSize
CreateFileA
DeleteFileA
GetVersion
ExitProcess
GetLastError
CreateMutexA
DeviceIoControl
OpenProcess
GlobalFree
LoadLibraryExA
GlobalAlloc
GetProcAddress
GetModuleHandleA
GetLocalTime
TerminateProcess
CloseHandle
Process32Next
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetWindowsDirectoryA
RaiseException
DeleteCriticalSection
lstrlenA
lstrcatA
MultiByteToWideChar
GetSystemDirectoryA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FreeLibrary
GetVersionExA
ReadFile
SetEndOfFile
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
GetStringTypeW
GetStringTypeA
GetDateFormatA
GetTimeFormatA
WaitForSingleObject
GetCurrentThreadId
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
SetEvent
OpenEventA
lstrcpyA
lstrcpyW
OutputDebugStringA
OutputDebugStringW
lstrcpynW
VirtualAlloc
UnmapViewOfFile
IsBadReadPtr
GetSystemInfo
MapViewOfFile
CreateFileMappingA
GetCurrentThread
OpenFileMappingA
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
GetModuleFileNameA
DebugBreak
GetStdHandle
WriteFile
LoadLibraryA
RtlUnwind
IsBadWritePtr
HeapValidate
GetStartupInfoA
GetCommandLineA
FatalAppExitA
GetCurrentProcess
SetConsoleCtrlHandler
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetLastError
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
GetProcessHeap
SetUnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
LCMapStringA
LCMapStringW
SetFilePointer
SetHandleCount
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
IsBadCodePtr
GetOEMCP
GetCPInfo
user32
GetWindowRect
IsWindowUnicode
GetMessageW
GetMessageA
GetCursorPos
SetCursorPos
PeekMessageA
MsgWaitForMultipleObjects
UnregisterClassA
FindWindowA
FindWindowExA
DispatchMessageA
DispatchMessageW
TranslateMessage
advapi32
RegCreateKeyExA
ControlService
DeleteService
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
GetUserNameA
SetThreadToken
RevertToSelf
OpenThreadToken
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
CoReleaseMarshalData
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoRevokeClassObject
CoRegisterClassObject
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
netapi32
Netbios
Sections
.textbss Size: - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 228KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ