C:\Users\Rafael\Documents\lastmalware\programação\c++\andromedaclipper modded\x64\Release\WMI Provider Host.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d5eb8438cf0c03f0c85097cdc1d06e9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d5eb8438cf0c03f0c85097cdc1d06e9_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0d5eb8438cf0c03f0c85097cdc1d06e9_JaffaCakes118
-
Size
130KB
-
MD5
0d5eb8438cf0c03f0c85097cdc1d06e9
-
SHA1
8a71023c92d9232cde0d3138a9fdfa5d4a47f477
-
SHA256
1aa4c14c7d11b4932e46d774202c5a678f94afc0cf4af0f9e847c759bef49731
-
SHA512
0eb36edf008e4f3ab08869263313d333866f358838f5a288f2cfd3bdfd717357d156d637f9a7e062e7fef72bcdfe4b1938ccb729949ae983c728e5ceeea4db77
-
SSDEEP
768:/JTQUCoL3rUjnFA8irBo3icjGC/Y1y11y1CeFBfZSWe:/J0UCyrsYhhjLy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d5eb8438cf0c03f0c85097cdc1d06e9_JaffaCakes118
Files
-
0d5eb8438cf0c03f0c85097cdc1d06e9_JaffaCakes118.exe windows:6 windows x64 arch:x64
18789ecfd4894e8b9a5ad3ce082d4575
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
WinExec
GlobalUnlock
GetLastError
GetConsoleWindow
CreateEventA
CopyFileA
CloseHandle
SetFileAttributesA
CreateProcessA
CreateDirectoryA
GlobalLock
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GlobalFree
GlobalAlloc
Sleep
GetModuleFileNameA
GlobalMemoryStatusEx
RtlCaptureContext
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
user32
GetWindowRect
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
ShowWindow
GetDesktopWindow
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception_context
memmove
memcpy
__std_exception_destroy
__std_exception_copy
memcmp
memset
_CxxThrowException
__C_specific_handler
__current_exception
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_crt_atexit
_c_exit
_register_onexit_function
_invalid_parameter_noinfo_noreturn
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__p___argc
_set_app_type
terminate
_cexit
__p___argv
_initialize_onexit_table
_seh_filter_exe
api-ms-win-crt-environment-l1-1-0
_dupenv_s
api-ms-win-crt-heap-l1-1-0
_set_new_mode
_callnewh
free
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ