e:\projects\windows\BHORemover\Release\SpyBHORemover.pdb
Static task
static1
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
SpyBHORemover.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
SpyBHORemover.exe
Resource
win10v2004-20240508-en
General
-
Target
0d601e8874ee959826256fbbcc00a6a5_JaffaCakes118
-
Size
1001KB
-
MD5
0d601e8874ee959826256fbbcc00a6a5
-
SHA1
759acb203e26991fd7a080a23e09b1b3489d7a28
-
SHA256
6ad16b02a87f43b10bf1fac624d4ace49efd9f871316166397bff0c55bf6f340
-
SHA512
c3cc4dd4db70edcd8e85ecdbd49409c7d25ea461708de9b5c8a55e2abf978a3768cef65a25ba87b7ad483794c6fa0e4f6424444f7694125a4d25b26e20ff83f5
-
SSDEEP
24576:jP2koSQiAFkBS1b6RD0DXeFlwYECWztucjQz2KI0:7QtiikB06RYD8wWZ2KI0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/SpyBHORemover.exe
Files
-
0d601e8874ee959826256fbbcc00a6a5_JaffaCakes118.rar
-
155绿色软件站.url.url
-
SpyBHORemover.exe.exe windows:5 windows x86 arch:x86
afd20521b03770749887eb589f42afa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
GetCommandLineA
GetStartupInfoA
ExitProcess
ExitThread
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
HeapFree
HeapDestroy
VirtualFree
FatalAppExitA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetConsoleCtrlHandler
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
RtlUnwind
GetFileTime
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
SetErrorMode
GetOEMCP
GetCPInfo
SystemTimeToFileTime
GetAtomNameA
GetModuleHandleW
GetShortPathNameA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
lstrcmpiA
GetThreadLocale
GetStringTypeExA
DeleteFileA
MoveFileA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GetCurrentDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
FreeResource
GlobalFree
CopyFileA
GlobalSize
GlobalUnlock
FormatMessageA
LocalFree
lstrlenW
MulDiv
lstrlenA
GetCurrentProcessId
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
lstrcpynA
FreeLibrary
MultiByteToWideChar
CreateProcessA
GetLogicalDrives
GetDriveTypeA
ReadFile
ExpandEnvironmentStringsA
GetExitCodeProcess
CreateDirectoryA
WriteFile
CreateFileA
GetFileSizeEx
GetFileAttributesExA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateRemoteThread
GetFileAttributesA
GetCurrentProcess
GetVersionExA
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
GetTickCount
CreateThread
WaitForSingleObject
TerminateThread
GetExitCodeThread
TerminateProcess
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetTempPathA
Sleep
OpenProcess
GetLongPathNameA
ReadProcessMemory
CloseHandle
ProcessIdToSessionId
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
HeapCreate
user32
ScrollWindowEx
MoveWindow
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
SendDlgItemMessageA
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
GetWindow
MapVirtualKeyA
GetKeyNameTextA
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ScreenToClient
GrayStringA
DrawTextExA
TabbedTextOutA
FillRect
SystemParametersInfoA
DestroyMenu
GetMenuItemInfoA
CopyRect
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
RemoveMenu
GetLastActivePopup
IsWindowEnabled
MessageBoxA
ShowOwnedPopups
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetWindowTextA
SetTimer
GetMenuState
CheckMenuItem
PostQuitMessage
InflateRect
GetNextDlgGroupItem
PostMessageA
GetCapture
ClientToScreen
WindowFromPoint
GetIconInfo
GetWindowLongA
DrawEdge
OffsetRect
SetRectEmpty
DrawStateA
SetWindowLongA
LoadCursorA
SetCursor
ReleaseCapture
GetParent
SetCapture
RedrawWindow
PtInRect
DrawTextA
SetRect
LoadBitmapA
DrawIcon
AppendMenuA
EnableMenuItem
LoadImageA
CopyIcon
DestroyIcon
FindWindowA
WaitForInputIdle
GetWindowThreadProcessId
ShowWindow
SetForegroundWindow
FindWindowExA
SetFocus
GetSysColor
GetSystemMetrics
GetCursorPos
LoadIconA
EnableWindow
GetActiveWindow
IsWindowVisible
InvalidateRect
UpdateWindow
GetClientRect
GetWindowRect
IsIconic
GetSystemMenu
SendMessageA
GetWindowTextLengthA
GetWindowPlacement
IntersectRect
GetMenu
CallWindowProcA
DefWindowProcA
SetWindowPlacement
SetScrollInfo
LoadMenuA
SetMenuItemBitmaps
GetScrollInfo
LockWindowUpdate
GetDCEx
UnionRect
SetParent
IsRectEmpty
GetMenuCheckMarkDimensions
KillTimer
GetSubMenu
ModifyMenuA
UnpackDDElParam
ReuseDDElParam
GetMenuBarInfo
LoadAcceleratorsA
CreatePopupMenu
InsertMenuItemA
BringWindowToTop
TranslateAcceleratorA
UnregisterClassA
GetDialogBaseUnits
CharUpperA
GetSysColorBrush
WaitMessage
DeleteMenu
RegisterWindowMessageA
WinHelpA
IsChild
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetFocus
DeferWindowPos
SetWindowPos
gdi32
MoveToEx
SetTextAlign
SetTextJustification
SetTextCharacterExtra
SetMapperFlags
SetArcDirection
SetColorAdjustment
SelectClipRgn
GetClipRgn
CreateRectRgn
SelectClipPath
GetViewportExtEx
GetWindowExtEx
GetPixel
StartDocA
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
LineTo
ArcTo
PolyDraw
PolylineTo
PolyBezierTo
ExtSelectClipRgn
DeleteDC
CreateDIBPatternBrushPt
CreatePatternBrush
SelectPalette
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
CreatePen
ExtCreatePen
CreateHatchBrush
CreateRectRgnIndirect
PatBlt
GetDCOrgEx
SetRectRgn
CombineRgn
GetMapMode
DPtoLP
GetCharWidthA
GetTextMetricsA
GetBkColor
OffsetClipRgn
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
ModifyWorldTransform
SetWorldTransform
SetGraphicsMode
SetROP2
SetPolyFillMode
SetBkColor
RestoreDC
SaveDC
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
CopyMetaFileA
GetDeviceCaps
CreateBitmap
StretchDIBits
SetStretchBltMode
SetDIBitsToDevice
GetObjectA
CreateFontIndirectA
SetTextColor
SelectObject
SetBkMode
DeleteObject
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontA
CreateSolidBrush
GetCurrentPositionEx
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
CryptReleaseContext
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegEnumKeyExA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
CryptAcquireContextA
CryptCreateHash
LookupPrivilegeValueA
CryptHashData
CryptDestroyHash
CryptGetHashParam
RegDeleteValueA
OpenProcessToken
RegEnumValueA
shell32
ord680
ShellExecuteExA
SHGetFileInfoA
ExtractIconA
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
_TrackMouseEvent
shlwapi
PathFileExistsA
PathFindExtensionA
PathRemoveExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
SHDeleteKeyA
PathIsUNCA
ole32
OleDuplicateData
CoUninitialize
CoCreateInstance
StringFromCLSID
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
CoTaskMemAlloc
WriteFmtUserTypeStg
CoInitializeEx
StringFromGUID2
CoDisconnectObject
CLSIDFromString
SetConvertStg
CoTaskMemFree
ReleaseStgMedium
CreateBindCtx
WriteClassStg
CoTreatAsClass
oleaut32
SafeArrayDestroy
SafeArrayLock
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetElement
SafeArrayCopy
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SafeArrayRedim
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
LoadRegTypeLi
LoadTypeLi
RegisterTypeLi
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysStringLen
SafeArrayDestroyData
SafeArrayDestroyDescriptor
VariantTimeToSystemTime
SystemTimeToVariantTime
SysReAllocStringLen
VarDateFromStr
VarBstrFromCy
VarBstrFromDec
VarDecFromStr
VarCyFromStr
VarBstrFromDate
SafeArrayUnlock
winhttp
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpCloseHandle
WinHttpReadData
psapi
EnumProcesses
GetModuleBaseNameA
GetPerformanceInfo
GetProcessMemoryInfo
GetModuleFileNameExA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
crypt32
CertGetSubjectCertificateFromStore
CertOpenStore
CryptMsgGetParam
CryptMsgClose
CertCloseStore
CryptQueryObject
Sections
.text Size: 483KB - Virtual size: 482KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ