f:\Projects\VS2005\WinCrashReport\Release\WinCrashReport.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bc61f48cffbf7ad534de57e8db3de6da_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bc61f48cffbf7ad534de57e8db3de6da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc61f48cffbf7ad534de57e8db3de6da_JaffaCakes118
-
Size
193KB
-
MD5
bc61f48cffbf7ad534de57e8db3de6da
-
SHA1
da4880207c45b9b8b7ec91b66921793ef4ff9e58
-
SHA256
eff440bb38c5601bb33dbf7a9a60d86a5a3e3805acc6be510b6fa6519f1ffa07
-
SHA512
d4eece584694bbee4484c54fde7bf4016e8fb2b68fe4d3d6884eaed84bee4a6edc4c57308a8d3bd9a66ff1fde6996b74f6c0c705d86b212a00c7724051288738
-
SSDEEP
3072:jUcGITECtAlSTwchQx/R/LMURZJ+bN4MbKGkaw/tOLC5gC7/6PhN:jUjCtW/VLN+bSILC5w
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule sample Nirsoft -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc61f48cffbf7ad534de57e8db3de6da_JaffaCakes118
Files
-
bc61f48cffbf7ad534de57e8db3de6da_JaffaCakes118.exe windows:4 windows x86 arch:x86
5598bf0febc30a33f87ecb4ae2d8eaa3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
CreateStatusWindowW
ImageList_Create
ImageList_AddMasked
ImageList_SetImageCount
CreateToolbarEx
ord17
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
kernel32
GetDateFormatW
FindClose
GetTempFileNameW
GetFileSize
GetTimeFormatW
FindFirstFileW
GetFileAttributesW
GetWindowsDirectoryW
SetFilePointer
ReadFile
GetModuleFileNameW
LocalFree
WriteFile
GetNumberFormatW
CreateFileW
LockResource
lstrcpyW
lstrlenW
FlushInstructionCache
DeleteCriticalSection
LeaveCriticalSection
RaiseException
GetCurrentThreadId
EnterCriticalSection
InitializeCriticalSection
InterlockedIncrement
lstrcmpW
MulDiv
SetLastError
InterlockedDecrement
GetCurrentProcess
EnumResourceNamesW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetStdHandle
DeleteFileW
SetEvent
SetErrorMode
GetCurrentProcessId
ExitProcess
TerminateProcess
EnumResourceTypesW
HeapFree
GetProcessHeap
GetVersionExW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
InterlockedExchange
GetConsoleMode
GetConsoleCP
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetModuleFileNameA
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
Sleep
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
GetVersionExA
HeapReAlloc
HeapAlloc
FormatMessageW
GlobalLock
GetCommandLineW
SizeofResource
FindNextFileW
GetLastError
GetLocaleInfoW
GetTempPathW
WideCharToMultiByte
LoadLibraryExW
GlobalUnlock
LoadResource
GlobalAlloc
FindResourceW
FreeLibrary
FileTimeToSystemTime
LoadLibraryW
ReadProcessMemory
FileTimeToLocalFileTime
CloseHandle
OpenProcess
VirtualQuery
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
InterlockedCompareExchange
IsProcessorFeaturePresent
GetThreadLocale
user32
RegisterClassExW
FillRect
CreateAcceleratorTableW
IsChild
InvalidateRgn
GetDesktopWindow
ClientToScreen
SetWindowPos
DestroyAcceleratorTable
IsWindow
ReleaseCapture
DestroyWindow
UnregisterClassA
LoadCursorW
DialogBoxParamW
ShowWindow
ChildWindowFromPoint
GetClassInfoExW
SetCapture
CallWindowProcW
GetWindowTextW
BeginDeferWindowPos
CharNextW
RegisterWindowMessageW
RedrawWindow
GetMenu
MapWindowPoints
EnableWindow
GetDlgCtrlID
CreateDialogParamW
EnumChildWindows
DestroyIcon
LoadStringW
LoadMenuW
ModifyMenuW
GetMenuItemInfoW
LoadIconW
GetSysColorBrush
SetCursor
InvalidateRect
GetWindow
SetDlgItemInt
SetWindowTextW
BeginPaint
UpdateWindow
GetClientRect
SetDlgItemTextW
GetSystemMetrics
DeferWindowPos
CreateWindowExW
SetForegroundWindow
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
TranslateMessage
DrawTextExW
GetMessageW
IsDialogMessageW
PostQuitMessage
PostThreadMessageW
EndDeferWindowPos
TrackPopupMenu
DispatchMessageW
GetFocus
SetClipboardData
GetSysColor
GetParent
GetCursorPos
CheckMenuItem
CloseClipboard
CheckMenuRadioItem
GetMenuItemCount
ScreenToClient
GetMenuStringW
MoveWindow
OpenClipboard
GetClassNameW
ReleaseDC
EnableMenuItem
EmptyClipboard
GetDC
GetSubMenu
SetFocus
GetWindowLongW
LoadImageW
SetMenu
MessageBoxW
RegisterClassW
SetWindowPlacement
SendMessageW
TranslateAcceleratorW
DefWindowProcW
PostMessageW
LoadAcceleratorsW
GetWindowPlacement
GetDlgItem
EndPaint
SetWindowLongW
EndDialog
SendDlgItemMessageW
GetWindowTextLengthW
GetDlgItemInt
GetWindowRect
DestroyMenu
gdi32
CreateCompatibleDC
DeleteDC
BitBlt
GetStockObject
SetBkColor
GetTextExtentPoint32W
GetDeviceCaps
GetObjectW
CreateSolidBrush
PatBlt
SelectObject
SetTextColor
CreateFontIndirectW
SetBkMode
CreateCompatibleBitmap
DeleteObject
comdlg32
GetSaveFileNameW
FindTextW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
Shell_NotifyIconW
SHGetFileInfoW
ShellExecuteW
ole32
CoGetClassObject
OleLockRunning
OleUninitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
StringFromGUID2
CLSIDFromProgID
OleInitialize
CLSIDFromString
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysAllocString
SafeArrayDestroy
LoadTypeLi
SafeArrayAccessData
VariantClear
SysAllocStringLen
SysFreeString
SysStringLen
VariantInit
SysStringByteLen
DispCallFunc
OleCreateFontIndirect
SafeArrayUnaccessData
SafeArrayCreateVector
LoadRegTypeLi
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ