wmplayer.pdb
Behavioral task
behavioral1
Sample
f7428025d2f1d72e33ca6cea090e22a1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7428025d2f1d72e33ca6cea090e22a1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f7428025d2f1d72e33ca6cea090e22a1_JaffaCakes118
-
Size
184KB
-
MD5
f7428025d2f1d72e33ca6cea090e22a1
-
SHA1
763f4726ce970321fb81929fd0ec8f11a9c6ffde
-
SHA256
d2039f968112efbbf1529367417a335b192c86e52660cb7443c16409e51581a0
-
SHA512
728d7d5ee9f5803b1e6dbb5413d6d14ec3d01243cd524ade8a191edd63acbc32ee98deb26e603d03be50dd49da13803e1c4cc1610af3b263b34c7fb88e2c4031
-
SSDEEP
3072:YF6RN336MdMfLirVQW0/nyypR6obhsRzYsc7v97y6C0y1et0i0nlef7ojPSZj59L:YYqqULirVT01AmSgZFC0+e2lGu+L
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7428025d2f1d72e33ca6cea090e22a1_JaffaCakes118
Files
-
f7428025d2f1d72e33ca6cea090e22a1_JaffaCakes118.exe windows:5 windows x86 arch:x86
27f43ad2b52e517389ec59a75846a548
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32
GetLastError
lstrlenW
CompareStringA
ExitProcess
FreeLibrary
SetErrorMode
GetProcAddress
HeapFree
SetCurrentDirectoryA
CloseHandle
CreateMutexA
GetStartupInfoA
GetCommandLineW
MultiByteToWideChar
HeapAlloc
lstrlenA
GetVersion
GetProcessHeap
SetThreadPriority
GetCurrentThread
LocalFree
LoadLibraryA
FormatMessageA
GetCommandLineA
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InterlockedExchange
LocalAlloc
RaiseException
user32
IsIconic
SetForegroundWindow
GetClassNameA
GetParent
GetDesktopWindow
GetWindowThreadProcessId
IsWindowVisible
GetWindow
MessageBoxA
FindWindowA
SendMessageTimeoutA
ShowWindow
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE