oemig50.pdb
Behavioral task
behavioral1
Sample
69cafdec6e8f4d51a4ca956f96202d87_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
69cafdec6e8f4d51a4ca956f96202d87_JaffaCakes118
-
Size
203KB
-
MD5
69cafdec6e8f4d51a4ca956f96202d87
-
SHA1
330b5222aacb16e098f99db7d01456c3a1b06332
-
SHA256
370f8fc4a4dccf8700f1a4dab7c087d8285f562ff01d251aa94bc164cd5f4aef
-
SHA512
82cbc00d83ef34cc434177318d2967cb323b6b6f2eacf0fa46ea140a7fc05e84f1db0bae91df4ca38a531ab906b54f8d6d0485107508a297d3a04b408b004e8d
-
SSDEEP
6144:ev+FKc5DyglnmT/Q+BAf+htWF7cQpL5eVjcm:u+ouyglnmTY+U+mFXp5m
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69cafdec6e8f4d51a4ca956f96202d87_JaffaCakes118
Files
-
69cafdec6e8f4d51a4ca956f96202d87_JaffaCakes118.exe windows:5 windows x86 arch:x86
b496ff6f7a3596971eca54cc54a79354
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegOverridePredefKey
RegOpenKeyA
kernel32
GetLocaleInfoA
lstrcmpiA
FindClose
FindNextFileA
FindFirstFileA
CloseHandle
GetLocalTime
WriteFile
lstrlenA
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileA
GetDiskFreeSpaceA
GetLastError
CreateDirectoryA
SystemTimeToFileTime
GetSystemTime
DeleteFileA
lstrcmpA
TlsSetValue
TlsGetValue
ReleaseMutex
TlsFree
TlsAlloc
WaitForSingleObject
CreateMutexA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
IsDBCSLeadByteEx
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SetUnhandledExceptionFilter
user32
SetFocus
CheckDlgButton
SetForegroundWindow
EndDialog
IsDlgButtonChecked
DialogBoxParamA
MessageBoxA
ShowWindow
CreateDialogParamA
GetDesktopWindow
IsDialogMessageA
TranslateMessage
PeekMessageA
LoadStringA
GetDlgItem
SendMessageA
SetDlgItemTextA
DestroyWindow
CharPrevA
SetWindowPos
OffsetRect
DispatchMessageA
SystemParametersInfoA
GetParent
GetWindowRect
comctl32
InitCommonControlsEx
shlwapi
wnsprintfA
StrFormatByteSize64A
ole32
CoInitialize
CoGetMalloc
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE