DFDWiz.pdb
Behavioral task
behavioral1
Sample
83bdfac386b29de4090388618021213b_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
83bdfac386b29de4090388618021213b_JaffaCakes118
-
Size
211KB
-
MD5
83bdfac386b29de4090388618021213b
-
SHA1
066741ded587630b2a6460d78d2e12baa782eb88
-
SHA256
8e405c175dd9791d4ef963f2106cd88bff26e2f97271302fe0bb307b0776675b
-
SHA512
cbb224b506349d89809cbacae9bc5329efc175c65be3f6e0b328b09181d1c213828b7dc4e757def386c685b3bb22b8db17a2477293e02e3e37a47f4e530fde05
-
SSDEEP
6144:uvUn9evZe94U81u9hDyOYvh75FRCeiM7dtun:3Mw95eu9hG35F4Zf
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83bdfac386b29de4090388618021213b_JaffaCakes118
Files
-
83bdfac386b29de4090388618021213b_JaffaCakes118.exe windows:6 windows x86 arch:x86
53af0e433b3e79ed57056036bac89ed1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
TraceMessage
OpenProcessToken
RegEnumKeyExW
EventWrite
RegDeleteKeyW
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
LookupPrivilegeValueW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
InitiateShutdownW
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
EventUnregister
EventRegister
RegEnumValueW
kernel32
GlobalFree
MulDiv
HeapFree
HeapAlloc
WriteFile
CreateFileW
GetCurrentProcess
GetCurrentThreadId
CreateMutexW
CreateEventW
GetVersionExW
FormatMessageW
GetProcessHeap
RegisterApplicationRestart
HeapSetInformation
GetSystemTime
SystemTimeToFileTime
CloseHandle
LoadLibraryA
OutputDebugStringA
GetModuleFileNameW
SetLastError
GetLastError
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
LoadLibraryW
GetModuleHandleA
OpenMutexW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoA
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
DeviceIoControl
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
LocalFree
gdi32
DeleteObject
SetAbortProc
SetMapMode
GetDeviceCaps
CreateFontIndirectW
SelectObject
StartDocW
StartPage
EndPage
EndDoc
AbortDoc
DeleteDC
user32
DialogBoxParamW
EndDialog
DefWindowProcW
SetWindowLongW
DestroyWindow
SetDlgItemTextW
LoadStringW
MessageBoxW
SetCursor
SendMessageW
DrawTextW
EnumThreadWindows
GetWindowLongW
SetWindowPos
LoadIconW
CreateWindowExW
MsgWaitForMultipleObjects
DispatchMessageW
PeekMessageW
LoadCursorW
PostMessageW
GetParent
ShowWindow
GetDlgItem
IsDialogMessageW
SetFocus
EnableWindow
CreateDialogParamW
TranslateMessage
msvcrt
_ftol2_sse
_wcslwr
_wcsupr
wcsstr
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
_vsnwprintf
__getmainargs
_controlfp
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
__CxxFrameHandler3
_wcsicmp
memcpy
_cexit
ole32
CoInitializeEx
CoCreateInstance
CoInitialize
CoUninitialize
CoCreateGuid
StringFromGUID2
ntdll
WinSqmAddToStream
WinSqmSetDWORD
WinSqmEndSession
NtQuerySystemTime
WinSqmStartSession
userenv
GetUserProfileDirectoryW
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceRegistryPropertyW
SetupDiGetClassDevsW
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE