l:\宠物森林\VC9 5street\release\dancebot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2d5b25acf8da9b79c1560e7baecf42aa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d5b25acf8da9b79c1560e7baecf42aa_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d5b25acf8da9b79c1560e7baecf42aa_JaffaCakes118
-
Size
476KB
-
MD5
2d5b25acf8da9b79c1560e7baecf42aa
-
SHA1
a8e8cd489498ac8bb9f0c64b038d6acbcd33c038
-
SHA256
4111040f918870020443918b40426dd948185b9da2d1a0d589ecb068dda3bdd0
-
SHA512
30b5d58ea23d6a536a43978481d1e4f88e2fa7346b855cffac0017055f9d91c81131092efd35e658f878c243f6c67779713bc1ed994158ad0e2e526d973dcd2e
-
SSDEEP
12288:+EJ8nvHNLPLm1w5xuw+T+ad/wcea7zHjXEPkxF6MgM:+Pn1LPS1f+ad/wcFFxMMgM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d5b25acf8da9b79c1560e7baecf42aa_JaffaCakes118
Files
-
2d5b25acf8da9b79c1560e7baecf42aa_JaffaCakes118.exe windows:5 windows x86 arch:x86
83b31e95d2daa46015eb16e8ea945ccd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
dbghelp
MiniDumpWriteDump
kernel32
GetTickCount
HeapFree
HeapReAlloc
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetStartupInfoA
SetStdHandle
GetFileType
RtlUnwind
RaiseException
ExitProcess
HeapSize
HeapCreate
VirtualFree
SetErrorMode
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetStdHandle
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetModuleHandleW
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
InterlockedDecrement
GetModuleFileNameW
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
lstrcmpW
GetVersionExA
GetThreadLocale
InterlockedIncrement
lstrcmpA
SetLastError
FormatMessageA
LocalFree
MulDiv
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
CreateDirectoryA
CreateProcessA
SetCurrentDirectoryA
LoadLibraryA
OutputDebugStringA
GlobalUnlock
GlobalLock
lstrlenA
MultiByteToWideChar
lstrlenW
InterlockedExchange
CreateThread
SetUnhandledExceptionFilter
GetProcAddress
Sleep
CloseHandle
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
GlobalFree
GlobalAlloc
GetLastError
user32
PostThreadMessageA
DestroyMenu
ReleaseCapture
SetCapture
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
ReleaseDC
GetDC
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
GetWindowThreadProcessId
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
RegisterClipboardFormatA
UnregisterClassA
MessageBeep
SetMenuItemBitmaps
GetNextDlgGroupItem
IntersectRect
SystemParametersInfoA
GetWindowPlacement
IsWindow
GetDlgItem
GetParent
OffsetRect
PtInRect
CopyRect
GetDlgCtrlID
GetWindow
CharNextA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowLongA
GetWindowRect
LoadCursorA
SetCursor
MessageBoxA
InvalidateRect
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SendMessageA
SetTimer
MessageBoxW
LoadIconA
EnableWindow
GetCapture
CharUpperA
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
ScaleViewportExtEx
OffsetViewportOrgEx
GetRgnBox
GetMapMode
SetViewportExtEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteDC
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateRectRgnIndirect
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetTextColor
GetBkColor
GetStockObject
GetDeviceCaps
CreateDIBSection
GetObjectA
SetDIBColorTable
CreateCompatibleDC
GetDIBColorTable
StretchBlt
SelectObject
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathRemoveFileSpecW
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
OleUninitialize
StgCreateDocfileOnILockBytes
OleInitialize
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemFree
CoFreeUnusedLibraries
CoUninitialize
CoInitialize
OleIsCurrentClipboard
CoRevokeClassObject
oleaut32
OleCreateFontIndirect
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
VariantCopy
VariantChangeType
VariantInit
urlmon
URLDownloadToFileA
wsock32
WSAStartup
WSACleanup
WSASetLastError
gdiplus
GdipGetImageDecodersSize
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImagePaletteSize
GdipGetImagePalette
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipCloneImage
GdipAlloc
GdipFree
GdipDisposeImage
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipDrawImageI
GdiplusStartup
GdipGetImageDecoders
GdiplusShutdown
wininet
InternetCloseHandle
InternetOpenUrlA
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
DeleteUrlCacheEntry
InternetOpenA
Sections
.text Size: 292KB - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ