f:\Projects\VS2005\ProduKey\x64\Release\ProduKey.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c0c5b181c0f1220b05134f186b73449f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0c5b181c0f1220b05134f186b73449f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0c5b181c0f1220b05134f186b73449f_JaffaCakes118
-
Size
101KB
-
MD5
c0c5b181c0f1220b05134f186b73449f
-
SHA1
8b70fdded3cd7cd78bee631094c3140f6c09bb18
-
SHA256
c0be7a344a863894890127e61851838037bd9d076423bfc8296cfd6e01d66f6b
-
SHA512
146367db3a7d0f44f50e220147531ab3269696a5dab772984f6a9cd911fa46fee073d283f1038553f8c88def72c0252f04be5eaab3dad6c242cad05e5edbf516
-
SSDEEP
3072:StbIBzfp9If07EeLC3MrHhwgkPeMOCECgwTG+U7N:SNIRpn7EGthwTc
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule sample Nirsoft -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0c5b181c0f1220b05134f186b73449f_JaffaCakes118
Files
-
c0c5b181c0f1220b05134f186b73449f_JaffaCakes118.exe windows:4 windows x64 arch:x64
99f0e48e17720cb2c19c3b34e209ceca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mpr
WNetCloseEnum
WNetOpenEnumA
WNetEnumResourceA
msvcrt
_exit
_cexit
exit
_acmdln
_mbsicmp
_purecall
qsort
_strlwr
_itoa
_c_exit
strtoul
strcmp
_memicmp
strchr
malloc
free
??2@YAPEAX_K@Z
??3@YAXPEAX@Z
_XcptFilter
__C_specific_handler
__dllonexit
_onexit
strlen
atoi
_strnicmp
_stricmp
strrchr
_strcmpi
memcpy
atof
memcmp
memset
strcpy
strcat
strncat
sprintf
__getmainargs
_initterm
__setusermatherr
_commode
_fmode
__set_app_type
comctl32
ImageList_Create
CreateToolbarEx
ord6
ImageList_AddMasked
ImageList_SetImageCount
ord17
ImageList_ReplaceIcon
ws2_32
gethostbyname
WSACleanup
WSAStartup
connect
WSAAsyncSelect
gethostbyaddr
closesocket
WSASetLastError
htons
WSAGetLastError
kernel32
OpenProcess
CreateThread
ResumeThread
ReadProcessMemory
ExitProcess
GetCurrentProcessId
DeleteFileA
SetErrorMode
GetStdHandle
EnumResourceNamesA
GetStartupInfoA
FormatMessageA
CreateFileA
WritePrivateProfileStringA
GetPrivateProfileIntA
MultiByteToWideChar
GlobalAlloc
GetLastError
LoadLibraryExA
FindFirstFileA
GetModuleHandleA
WriteFile
GetDateFormatA
GlobalUnlock
FindNextFileA
GetWindowsDirectoryA
GetFileSize
WideCharToMultiByte
GetPrivateProfileStringA
Sleep
GetCurrentProcess
CompareFileTime
GetLogicalDrives
GetComputerNameA
FileTimeToLocalFileTime
GetDriveTypeA
FileTimeToSystemTime
GetProcAddress
LoadLibraryA
FreeLibrary
GetTempFileNameA
FindClose
GetFileAttributesA
GetVersionExA
GlobalLock
GetTimeFormatA
CloseHandle
ReadFile
GetTempPathA
GetSystemDirectoryA
LocalFree
GetModuleFileNameA
user32
BeginDeferWindowPos
TrackPopupMenu
KillTimer
CreateDialogParamA
DestroyMenu
PostQuitMessage
DialogBoxParamA
LoadStringA
ModifyMenuA
LoadMenuA
GetWindowTextA
GetMenuItemInfoA
TranslateMessage
DeferWindowPos
IsDialogMessageA
SetTimer
DispatchMessageA
GetDlgCtrlID
GetFocus
EndDeferWindowPos
RegisterWindowMessageA
GetSysColorBrush
ShowWindow
ChildWindowFromPoint
SetCursor
LoadCursorA
GetDlgItemTextA
SetWindowTextA
SendDlgItemMessageA
GetDlgItemInt
EndDialog
GetDlgItem
CreateWindowExA
SetDlgItemInt
SetDlgItemTextA
UpdateWindow
GetSystemMetrics
GetWindowRect
PostMessageA
SetMenu
LoadAcceleratorsA
SetWindowPos
DefWindowProcA
TranslateAcceleratorA
MessageBoxA
GetWindowPlacement
SendMessageA
RegisterClassA
LoadImageA
LoadIconA
GetWindowLongA
SetWindowLongA
SetFocus
InvalidateRect
ReleaseDC
OpenClipboard
GetClassNameA
CloseClipboard
GetParent
GetMenuItemCount
GetSubMenu
GetMenuStringA
GetMenu
MoveWindow
GetCursorPos
GetDC
CheckMenuItem
GetSysColor
EnumChildWindows
SetClipboardData
GetClientRect
EnableWindow
EmptyClipboard
MapWindowPoints
EnableMenuItem
DestroyWindow
GetMessageA
gdi32
GetStockObject
GetTextExtentPoint32A
SetBkColor
GetDeviceCaps
SetTextColor
CreateFontIndirectA
SetBkMode
DeleteObject
comdlg32
FindTextA
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegEnumKeyExA
RegConnectRegistryA
RegLoadKeyA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegDeleteKeyA
RegUnLoadKeyA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ