c:\TS010311_4\CandleWorks\ProxySettings\bin\FXSettings.pdb
Behavioral task
behavioral1
Sample
ea56f755fa3c92a86d2a9a57322deec2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea56f755fa3c92a86d2a9a57322deec2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea56f755fa3c92a86d2a9a57322deec2_JaffaCakes118
-
Size
508KB
-
MD5
ea56f755fa3c92a86d2a9a57322deec2
-
SHA1
89e2c5a833173e1ac8cdf1278b1f700b6635b847
-
SHA256
f058e5c3bc78b173a2526c55937486e8c8ba94b5c40bd7257d01757038179aff
-
SHA512
45c90dbc8e6119e7b9273ec5b0ac4425e5f385084cf560d1051c86135c0daa7bfa311d81fe1a599f47d807344f9191c7a546cc34ec9e532d60b129cbad73dc53
-
SSDEEP
6144:41Xu4yKZhGIBOHePdU9Y9OA5mPEps5em:4du4/ZhlZ9BsPMm
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea56f755fa3c92a86d2a9a57322deec2_JaffaCakes118
Files
-
ea56f755fa3c92a86d2a9a57322deec2_JaffaCakes118.exe windows:4 windows x86 arch:x86
754424aaaee3a29ae4f21b40471fe974
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gstool2
??4string@gstool@@QAEAAV01@PBD@Z
?get@?$TVector@Vstring@gstool@@@gstool@@QBE?BVstring@2@H@Z
?assign@string@gstool@@QAEXPBDI@Z
??0BoundException@gstool@@QAE@XZ
??0string@gstool@@QAE@HH@Z
??4string@gstool@@QAEAAV01@ABV01@@Z
??8gstool@@YA_NABVstring@0@PBD@Z
?getSubKeyList@regkey@gstool@@QAE_NPAV?$TStrVector@D$0A@@2@@Z
??Hgstool@@YA?AVstring@0@ABV10@PBD@Z
??0string@gstool@@QAE@PBDI@Z
?open@regkey@gstool@@QAE_NPBD_N@Z
??Bstring@gstool@@QBEPBDXZ
??1string@gstool@@QAE@XZ
?close@regkey@gstool@@QAEXXZ
?getChar@string@gstool@@QAEDHI@Z
?size@string@gstool@@QBEHXZ
??1?$TVector@Vstring@gstool@@@gstool@@UAE@XZ
?add@?$TVector@Vstring@gstool@@@gstool@@QAEXVstring@2@@Z
??0?$TVector@Vstring@gstool@@@gstool@@QAE@XZ
??0string@gstool@@QAE@XZ
?getString@regkey@gstool@@QAE?AVstring@2@PBD0@Z
?getInt@regkey@gstool@@QAEIPBDI@Z
??0regkey@gstool@@QAE@XZ
?create@regkey@gstool@@QAE_NPBD@Z
?setInt@regkey@gstool@@QAE_NPBDI@Z
?setString@regkey@gstool@@QAE_NPBD0@Z
??1regkey@gstool@@QAE@XZ
wininet
InternetQueryOptionA
mfc80
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord605
ord1122
ord876
ord578
ord911
ord784
ord310
ord1482
ord1084
ord3210
ord1123
ord2322
ord1934
ord3161
ord1280
ord1063
ord1308
ord2176
ord3934
ord304
ord2902
ord2036
ord1100
ord1054
ord762
ord266
ord265
ord1185
ord1187
ord1191
ord1091
ord354
ord3182
ord4262
ord4486
ord2862
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord2931
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord6724
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3641
ord515
ord3293
ord2974
ord4720
ord5211
ord4580
ord4736
ord4213
ord4190
ord4844
ord4867
ord4617
ord4797
ord5070
ord5072
ord5071
ord6747
ord718
ord3204
ord2372
ord908
ord4035
ord3132
ord2164
ord2657
ord3070
ord3667
ord6067
ord572
ord3229
ord1207
ord5214
ord4237
ord1402
ord5915
ord6725
ord1570
ord2091
ord4099
ord1484
ord1933
ord6266
ord1397
ord657
ord3167
ord2941
ord2407
ord2412
ord2389
ord922
ord4233
ord1546
ord2087
ord4096
ord4508
ord1794
ord5744
ord2494
ord1916
ord781
ord5833
ord6180
ord6174
ord3761
ord5655
ord6090
ord721
ord3294
ord4272
ord2975
ord1521
ord4280
ord5212
ord1582
ord4583
ord1327
ord980
ord525
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord2990
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord764
ord934
ord2991
msvcr80
isalnum
strtol
wcslen
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_except_handler4_common
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_pipe
_write
_read
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
memset
_sopen_s
strncpy_s
strcpy_s
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
memmove_s
_invalid_parameter_noinfo
strrchr
_resetstkoflw
_recalloc
calloc
wcscpy_s
free
malloc
strcspn
strchr
_purecall
strstr
atoi
__argc
_stricmp
__argv
__CxxFrameHandler3
_setmbcp
_dup
_dup2
_close
_controlfp_s
_spawnvp
kernel32
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetProcAddress
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
AllocConsole
WriteConsoleA
GetStdHandle
GetExitCodeProcess
FreeConsole
GetCurrentDirectoryA
CreateThread
FreeLibrary
DeleteFileA
CreateProcessA
GetStartupInfoA
CloseHandle
OpenProcess
GetModuleHandleA
GetCommandLineA
WaitNamedPipeA
GetLastError
CreateFileA
WriteFile
ReadFile
InterlockedExchange
MultiByteToWideChar
WideCharToMultiByte
GetVersion
lstrlenW
CompareStringA
CompareStringW
lstrcmpiA
lstrcmpiW
lstrlenA
GetEnvironmentVariableA
GetEnvironmentVariableW
GetStringTypeExA
GetStringTypeExW
WaitForSingleObject
GetModuleFileNameA
MulDiv
LoadLibraryA
user32
EnableWindow
LoadIconA
GetDlgItem
GetDesktopWindow
GetDC
ReleaseDC
GetParent
SendMessageA
KillTimer
SetTimer
CharUpperW
LoadBitmapA
PostMessageA
GetWindowThreadProcessId
RegisterWindowMessageA
IsWindow
CharLowerA
CharLowerW
CharUpperA
gdi32
GetDeviceCaps
CreateFontIndirectA
shell32
ShellExecuteA
oleaut32
SysFreeString
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 240KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 148KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE