k:\ProjectS\VC9\AuBK_DLL\Release\AuBK.pdb
Behavioral task
behavioral1
Sample
aebd7487b2e8b58c1426dfffc7b860ac_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
aebd7487b2e8b58c1426dfffc7b860ac_JaffaCakes118
-
Size
875KB
-
MD5
aebd7487b2e8b58c1426dfffc7b860ac
-
SHA1
f86605e2f587afbcee79030ab0c09ac7d759542a
-
SHA256
2dcf1ae0ff628234d3797c1efd9787b104d5a1a58824790193982f07fab265c1
-
SHA512
29938d8a1eac66b024b54fb306c7a67eda95ad1408835eda80e68d19bc7349e40bebf12d289393dbe9c73c8a369164235f7c1d63a7e0a2127acc7955a3b02ae3
-
SSDEEP
24576:XO1236t8Bsxm2LxI+tLy/dvrd3UU7kW+Rh/1W:+Q36qUqkudvrd3UtzRJ1W
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aebd7487b2e8b58c1426dfffc7b860ac_JaffaCakes118
Files
-
aebd7487b2e8b58c1426dfffc7b860ac_JaffaCakes118.dll windows:5 windows x86 arch:x86
b9a896acc7723c0deb622778c8d0dd08
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetPrivateProfileStringA
RaiseException
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
VirtualAlloc
HeapReAlloc
SetStdHandle
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
UnmapViewOfFile
CloseHandle
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
GetTempPathA
GetSystemDirectoryA
lstrlenA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
MapViewOfFile
GetLastError
CreateFileMappingA
CreateFileA
ReadFile
SetFilePointer
OpenFileMappingA
CreateThread
EnterCriticalSection
GetCurrentProcess
FindCloseChangeNotification
Sleep
FindNextChangeNotification
WaitForSingleObject
FindFirstChangeNotificationA
VirtualProtect
WriteProcessMemory
MultiByteToWideChar
lstrlenW
GetCurrentProcessId
SetCurrentDirectoryA
ReleaseMutex
OpenMutexA
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
lstrcatA
GetProcAddress
LoadLibraryA
GlobalFree
GlobalAlloc
GetFileType
GetFileSize
TerminateThread
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FileTimeToSystemTime
InterlockedIncrement
GetTickCount
DeleteFileA
HeapFree
WriteFile
GetModuleHandleW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
HeapAlloc
LocalAlloc
CreateEventA
SuspendThread
SetEvent
ResumeThread
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GetModuleFileNameA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
lstrcmpA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
GetProcessHeap
WideCharToMultiByte
user32
DestroyMenu
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
UnregisterClassA
SetCursor
GetMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
ShowWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetWindowTextA
SetMenu
SetForegroundWindow
ExitWindowsEx
IsWindowVisible
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
GetActiveWindow
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
SendMessageA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
RegisterClassExA
wsprintfA
PostQuitMessage
EnableWindow
RegisterWindowMessageA
gdi32
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
DeleteDC
GetStockObject
RestoreDC
GetDeviceCaps
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
ScaleWindowExtEx
SaveDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
StrToIntW
StrToIntA
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
wsock32
connect
socket
closesocket
WSAStartup
gethostbyname
WSACleanup
htons
getpeername
WSASetLastError
psapi
GetModuleInformation
GetMappedFileNameA
iphlpapi
GetIfTable
ws2_32
WSCGetProviderPath
WSCEnumProtocols
imagehlp
ImageDirectoryEntryToData
Exports
Exports
StartHook
StopHook
send_en
Sections
.text Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 28KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SHARED Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE