E:\Conding\xmrig\back\Monero_Loader\Release\xmrig.pdb
Behavioral task
behavioral1
Sample
aee14e9b1ecb7367ade1f44876ac46b9_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
aee14e9b1ecb7367ade1f44876ac46b9_JaffaCakes118
-
Size
1.1MB
-
MD5
aee14e9b1ecb7367ade1f44876ac46b9
-
SHA1
057009604116db2aa799961729e5122e221b6403
-
SHA256
39c51dbcfa955fbaf168880f531eaf11619575a8f1167d2d9eaa37f1a585a7e2
-
SHA512
b1d668ed7abd1c2f4a4cf110252e43da77cd52b25f89e41feba4a14f1b2f02d570bc96bbff5f3aff18a83d08fbf6cb3d588668060e8cae3a4507e1fec5e49756
-
SSDEEP
24576:F31SZSaMidm23AzTOAV4xhFIaSV5VZZGSDNVwftoJNDBki+4K4zI4VX90mOfj:FwZSTidmvuAGhFA54qVwfoNDBkirJzIz
Malware Config
Signatures
Files
-
aee14e9b1ecb7367ade1f44876ac46b9_JaffaCakes118.exe windows:5 windows x86 arch:x86
f029615e3ff5f1b5bc405d8fef0a66e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
CopyFileW
TerminateProcess
FileTimeToSystemTime
GetModuleFileNameW
GetTempPathW
GetProcAddress
VirtualAllocEx
Process32FirstW
GetModuleFileNameA
Process32NextW
CreateToolhelp32Snapshot
GetCurrentProcessId
GetSystemTime
WriteProcessMemory
CreateThread
SetPriorityClass
GetCurrentProcess
GetLogicalDriveStringsW
GetSystemDirectoryW
GetCurrentThread
lstrcatA
GetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
SetThreadPriority
GetShortPathNameA
GetLocalTime
QueryDosDeviceW
lstrcmpiW
lstrcatW
GetFileTime
WinExec
DeleteFileW
lstrcpyW
lstrcpyA
InterlockedIncrement
GetStdHandle
SetHandleCount
LocalFree
CreateRemoteThread
GetModuleHandleW
OutputDebugStringW
WaitForSingleObject
CreateDirectoryW
HeapFree
InterlockedDecrement
GetSystemTimeAsFileTime
CreateMutexW
GetCommandLineW
GetLastError
CreateFileW
ReadFile
WideCharToMultiByte
WriteFile
CreateProcessW
CloseHandle
GetSystemInfo
GetExitCodeProcess
Sleep
OpenProcess
GetTickCount
lstrlenA
SetStdHandle
WriteConsoleW
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
FlushFileBuffers
SetFilePointer
HeapReAlloc
GetStringTypeW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapSize
GetFileType
EncodePointer
DecodePointer
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetFileAttributesW
ExitProcess
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
InitializeCriticalSectionAndSpinCount
user32
wsprintfA
wsprintfW
advapi32
AdjustTokenPrivileges
QueryServiceConfigW
ControlService
UnlockServiceDatabase
RegOpenKeyExW
QueryServiceStatusEx
QueryServiceStatus
StartServiceW
ChangeServiceConfig2W
LockServiceDatabase
RegOpenKeyW
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
LookupPrivilegeValueW
GetTokenInformation
OpenProcessToken
RegSetValueExW
RegCloseKey
RegisterServiceCtrlHandlerW
SetServiceStatus
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyExW
StartServiceCtrlDispatcherW
shell32
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
oleaut32
VariantChangeType
VariantInit
SysAllocString
SysFreeString
VariantClear
winhttp
WinHttpReceiveResponse
WinHttpSetTimeouts
WinHttpSendRequest
WinHttpConnect
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpReadData
WinHttpCrackUrl
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryDataAvailable
ws2_32
closesocket
socket
WSACleanup
sendto
htons
WSAStartup
recvfrom
inet_addr
psapi
GetProcessImageFileNameW
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 965KB - Virtual size: 974KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
P��[�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE