wmpenc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
170d5109b9c2982c2921483613d92762_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
170d5109b9c2982c2921483613d92762_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
170d5109b9c2982c2921483613d92762_JaffaCakes118
-
Size
50KB
-
MD5
170d5109b9c2982c2921483613d92762
-
SHA1
1761d11f98ec852b0fe7401986bee727e74e0098
-
SHA256
b951104300db6049eb3eae30b44eae8dda3b6c900ceec91fc4050f773265617a
-
SHA512
2509bc150b378be7a9865c12299e3d286ecf6088fd07ed2bdb8312216a2995812977b68c2d31207be82f33abb1f22afca82d1ebae434f79add734a7b04ba2f59
-
SSDEEP
768:bcAWIUJGwQ1SG3t5szsRRRFjky4LdKeP94+ymm4p6rkniX5lfNexPLy:bvvMG3td5nRDkRLdT/lm66rLnMpLy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 170d5109b9c2982c2921483613d92762_JaffaCakes118
Files
-
170d5109b9c2982c2921483613d92762_JaffaCakes118.exe windows:6 windows x86 arch:x86
0c8cf869c53bdb11cf994feaca9c9515
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
kernel32
GetLastError
SetPriorityClass
GetCurrentProcess
GetVersionExW
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MultiByteToWideChar
lstrlenW
lstrcpyW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
HeapDestroy
SetEvent
CloseHandle
WaitForSingleObject
lstrcpynW
GetModuleFileNameW
FreeLibrary
CreateThread
CreateEventW
lstrcatW
lstrlenA
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
Sleep
HeapSetInformation
GetCurrentThreadId
GetCommandLineW
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
DispatchMessageW
CharPrevW
PostThreadMessageW
CharNextW
GetMessageW
msvcrt
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
__setusermatherr
_exit
_amsg_exit
_initterm
_wcmdln
exit
_controlfp
_XcptFilter
??3@YAXPAX@Z
memset
_cexit
__wgetmainargs
_purecall
memcpy
??2@YAPAXI@Z
realloc
free
malloc
ole32
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoCreateInstance
CoRevokeClassObject
oleaut32
SysStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VarUI4FromStr
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pybejlg Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE