e:\工程\七剑超级键盘监视器\Win32\Release\EXE.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118
-
Size
88KB
-
MD5
eac3b5c8b29a2da696b3bfe4f3f062a0
-
SHA1
a80f593f0b42942eeabacf03597993d444569578
-
SHA256
add205d0c68984196bbc36a34833b3816bc41a63bb0638c3b3c7236df140b1f8
-
SHA512
0fc46a6ad57e54424f8582bc9292b80f3f94c8e2588e96856b5ca52411c381195d3a9ce7daaf4f35b9556897a1d4e84ab85860472c274fdbf5d00caff3c591f2
-
SSDEEP
1536:by+/zjdvA8I3eLQAJxa7gRBVBYgLle3li/6AZWIGDVW2Oy:++U3GnxpBVBYgLAVi/6AZWIGDVW2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118
Files
-
eac3b5c8b29a2da696b3bfe4f3f062a0_JaffaCakes118.exe windows:4 windows x86 arch:x86
2345d1c346e68f79f0d2fcb6a70aa0e8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
SizeofResource
FindResourceA
CreateThread
TerminateProcess
OpenProcess
CompareStringA
GetVersionExA
DeleteFileA
GetProcAddress
GetModuleHandleA
VirtualAlloc
FreeLibrary
LoadLibraryA
VirtualQueryEx
ReadProcessMemory
GetThreadContext
CreateProcessA
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
DeviceIoControl
CreateEventA
GlobalAlloc
CreateFileA
GetModuleFileNameA
GetSystemDirectoryA
ResetEvent
CompareStringW
GetLocaleInfoA
SetEndOfFile
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
VirtualQuery
InterlockedExchange
SetStdHandle
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GlobalUnlock
LockResource
WriteFile
GlobalFree
CopyFileA
GetLastError
CreateMutexA
WaitForSingleObject
CreateToolhelp32Snapshot
Process32First
GetLocalTime
Process32Next
CloseHandle
Sleep
lstrlenA
GlobalLock
SetUnhandledExceptionFilter
IsBadWritePtr
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
RtlUnwind
ExitProcess
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetSystemTimeAsFileTime
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
RaiseException
HeapFree
FlushFileBuffers
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
ReadFile
GetFullPathNameA
GetCurrentDirectoryA
HeapReAlloc
HeapSize
SetEnvironmentVariableA
user32
DispatchMessageA
TranslateMessage
GetMessageA
MessageBoxA
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
wsprintfA
UpdateWindow
GetForegroundWindow
GetWindowTextA
MapVirtualKeyA
GetKeyState
OpenClipboard
GetClipboardData
CloseClipboard
PostQuitMessage
DefWindowProcA
LoadIconA
gdi32
GetStockObject
advapi32
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
closesocket
connect
htons
gethostbyname
WSACleanup
socket
WSAStartup
send
recv
gethostname
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ