C:\u\n\s\3100\Win32vc\asc\PRD\exe\AimmsCOM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0a00d6a9f59ce8deabf793e5bfbf2cc5_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0a00d6a9f59ce8deabf793e5bfbf2cc5_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0a00d6a9f59ce8deabf793e5bfbf2cc5_JaffaCakes118
-
Size
158KB
-
MD5
0a00d6a9f59ce8deabf793e5bfbf2cc5
-
SHA1
bee9bfadfa3a789ccbbe03aa25416fbd728b3733
-
SHA256
92dee393eef2d0b10138dfd0d9e02f79e85294b231194b6988ee620adc45b412
-
SHA512
daf82bcdac0b5c15ebeab7b2c6db84bc05adf8db10f0b9d0d989dcedb9ed2cf09c966fe18525c842faf7d2ac75b50179a503638fb8106231e1ce3eab2f2137b1
-
SSDEEP
3072:5E5/dHCQbRrwXp39ffXxorAZOdB2VYxOPlS8iTsZlXoWwq1d7ETUI:ulHN5ufX1YxOPlS8iTsZlXoWwh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a00d6a9f59ce8deabf793e5bfbf2cc5_JaffaCakes118
Files
-
0a00d6a9f59ce8deabf793e5bfbf2cc5_JaffaCakes118.exe windows:4 windows x86 arch:x86
ad2930a4c0c3b3305892dd03ef747759
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
libaimms
_AimmsAttributeFlags@8
_AimmsAPILastError@8
_AimmsControlGet@4
_AimmsIdentifierEmpty@4
_AimmsAttributeName@8
_AimmsIdentifierDataVersion@8
_AimmsIdentifierUpdate@4
_AimmsSetAddTupleToCompoundRecursive@12
_AimmsSetAddTupleToCompound@12
_AimmsSetTupleToCompound@12
_AimmsSetCompoundToTuple@12
_AimmsSetDeleteElement@8
_AimmsSetAddElementRecursive@12
_AimmsSetAddElement@12
_AimmsSetOrdinalToName@12
_AimmsSetNameToOrdinal@12
_AimmsSetRenameElement@12
_AimmsAttributeCompoundDimension@8
_AimmsAttributeCompoundDomain@8
_AimmsServerProjectOpen@8
_AimmsProjectOpen@8
_AimmsProjectWindow@4
_AimmsProjectClose@8
_AimmsProcedureAsyncRunDelete@4
_AimmsProcedureRun@16
_AimmsProcedureHandleCreate@16
_AimmsProcedureHandleDelete@4
_AimmsValueNextMulti@16
_AimmsValueAssignMulti@16
_AimmsValueAssign@12
_AimmsValueRetrieve@12
_AimmsSetElementToName@12
_AimmsAttributeStorage@8
_AimmsAttributeType@8
_AimmsAttributeElementRange@8
_AimmsIdentifierHandleCreate@20
_AimmsAttributeDimension@12
_AimmsSetNameToElement@12
_AimmsSetOrdinalToElement@12
_AimmsSetElementToOrdinal@12
_AimmsValueNext@12
_AimmsAttributeDefault@8
_AimmsValueCard@8
_AimmsAttributeCallDomain@8
_AimmsAttributeDeclarationDomain@8
_AimmsControlRelease@0
_AimmsIdentifierHandleDelete@4
_AimmsValueResetHandle@4
_AimmsIdentifierCleanup@4
kernel32
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
UnhandledExceptionFilter
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapFree
GetProcessHeap
GetVersionExA
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
ProcessIdToSessionId
GetCommandLineA
LoadLibraryExA
LoadResource
SizeofResource
FreeLibrary
SetEvent
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
CreateEventA
CreateThread
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
Sleep
WaitForSingleObject
CloseHandle
lstrcmpiA
lstrlenA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
FindResourceA
oleaut32
SafeArrayCopy
SafeArrayGetUBound
SafeArrayGetVartype
SafeArrayDestroy
SafeArrayUnlock
VarBstrCat
LoadRegTypeLi
SafeArrayPutElement
SafeArrayGetLBound
SafeArrayGetElement
SysStringByteLen
SysAllocStringByteLen
SafeArrayCreate
CreateErrorInfo
SetErrorInfo
SysAllocStringLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetDim
VariantChangeType
VariantCopy
VariantClear
VariantInit
SysFreeString
SafeArrayLock
user32
CharUpperA
PostThreadMessageA
TranslateMessage
DispatchMessageA
GetMessageA
ShowWindow
IsWindow
SetTimer
UnregisterClassA
CharNextA
advapi32
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoInitialize
CoUninitialize
StringFromGUID2
CoCreateInstance
msvcr80
_fullpath
memmove
bsearch
qsort
calloc
?terminate@@YAXXZ
_except_handler4_common
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
strcpy_s
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
free
malloc
??_V@YAXPAX@Z
__CxxFrameHandler3
memcpy_s
_CxxThrowException
??3@YAXPAX@Z
wcsncpy_s
strncpy_s
strcat_s
_resetstkoflw
_recalloc
??_U@YAPAXI@Z
memset
_localtime64
_time64
wcstombs
__p__commode
__p__fmode
__set_app_type
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_controlfp_s
_purecall
fclose
fprintf
strftime
fopen
vsprintf
??2@YAPAXI@Z
wcsncmp
exit
wcsstr
memcpy
strchr
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ