cmdl32.pdb
Behavioral task
behavioral1
Sample
69986c9987b06053e32cf95508cfeba7_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
69986c9987b06053e32cf95508cfeba7_JaffaCakes118
-
Size
215KB
-
MD5
69986c9987b06053e32cf95508cfeba7
-
SHA1
9dc2d19927f4882f3338e46e8f9746187353854f
-
SHA256
4ad49f576c843dedc8717ad895a41ea7a7db06dd2c2501e20f325508743fefb5
-
SHA512
b80c622ad26172f22def113c1ce427f3c42dd77e4abf92c8c063d9fbbaeaf90bae0dea2a9646c1b44e5394ee08bc092cc848915995a3de9392bcfa8b269cf1b0
-
SSDEEP
6144:Q/tKJ4LWx0L4ixSY5tnQXKo9rIDDKuF4B02TbMyv:ahL4uAKdk0aN
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69986c9987b06053e32cf95508cfeba7_JaffaCakes118
Files
-
69986c9987b06053e32cf95508cfeba7_JaffaCakes118.exe windows:6 windows x86 arch:x86
d7c75ad5d405344eda1e9287e627f167
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
kernel32
SetLastError
ReadFile
WriteFile
SetFilePointer
CloseHandle
GetTempFileNameA
GetTempPathA
lstrlenA
SetFileAttributesA
lstrcmpiA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrlenW
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
WritePrivateProfileStringA
CopyFileA
FlushFileBuffers
Sleep
WaitForSingleObject
ConvertDefaultLocale
GetVersionExA
GetSystemInfo
GetPrivateProfileStringA
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryExA
SetEvent
CreateFileA
CreateThread
CreateEventA
GetModuleHandleA
GetCurrentProcessId
GetPrivateProfileSectionA
GlobalFree
ReleaseMutex
CreateMutexA
GetFileSize
CreateDirectoryA
GetProcessHeap
InterlockedIncrement
LoadLibraryA
InterlockedDecrement
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetLastError
GetTickCount
user32
RegisterClassExA
GetClassInfoExA
RegisterWindowMessageA
SetWindowTextA
SendDlgItemMessageA
ShowWindow
KillTimer
EndDialog
SetDlgItemTextA
GetDlgItemTextA
MoveWindow
GetSystemMetrics
SystemParametersInfoA
GetWindowRect
SetWindowLongA
SetFocus
CharNextA
EnableMenuItem
GetWindowLongA
PostMessageA
DialogBoxParamA
msvcrt
memcpy
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
__getmainargs
memset
_vsnprintf
_cexit
cmpbk32
PhoneBookParseInfoA
PhoneBookFreeFilter
PhoneBookLoad
PhoneBookMergeChanges
PhoneBookUnload
cmutil
CmStrchrA
IsLogonAsSystem
CmStrCpyAllocW
CmBuildFullPathFromRelativeA
?DeInit@CmLogFile@@QAEJXZ
?Init@CmLogFile@@QAEJPAUHINSTANCE__@@HPBD@Z
?SetParams@CmLogFile@@QAEJHKPBD@Z
?Start@CmLogFile@@QAEJH@Z
?Stop@CmLogFile@@QAEJXZ
CmLoadIconA
CmLoadSmallIconA
CmStrrchrA
?Log@CmLogFile@@QAAXW4_CMLOG_ITEM@@ZZ
CmFmtMsgA
??1CmLogFile@@QAE@XZ
??0CmLogFile@@QAE@XZ
CmCompareStringA
WzToSzWithAlloc
SzToWzWithAlloc
CmStrCpyAllocA
CmRealloc
CmMalloc
CmFree
comctl32
ord17
rasapi32
RasEnumConnectionsA
winhttp
WinHttpGetDefaultProxyConfiguration
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpReadData
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpCloseHandle
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE