f:\ARM\BuildResults\bin\Win32\Release\AdobeARM.pdb
Behavioral task
behavioral1
Sample
aee092c4ec5f5375f68c4af34d612651_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
aee092c4ec5f5375f68c4af34d612651_JaffaCakes118
-
Size
962KB
-
MD5
aee092c4ec5f5375f68c4af34d612651
-
SHA1
224d68056439733e24f46be1dfb052b35ac7b523
-
SHA256
48b068f7af7bb00b850b0639395e7be469702d0d383ec28679e25251f23f83ee
-
SHA512
aa45e45998291e58bc2da7dbcabdf938c6c6afd92769cdca94cc79c9798562b9f9ed98d779454dd78c4b24746ec3a84b852782de68fae7bd05dd904821f0db98
-
SSDEEP
12288:2agz0EwV1YcYxhrOoKgVqo7wU64sRz2Gn:230EwKcgVqo7wpR9
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aee092c4ec5f5375f68c4af34d612651_JaffaCakes118
Files
-
aee092c4ec5f5375f68c4af34d612651_JaffaCakes118.exe windows:5 windows x86 arch:x86
149bdcfc8037d76ac5485ae903d5d415
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord118
ord115
ord119
ord171
ord240
ord141
ord281
ord70
ord205
ord123
ord120
ord114
ord160
ord159
ord116
ord8
ord32
ord92
ord88
psapi
GetModuleFileNameExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wininet
DeleteUrlCacheEntryW
sensapi
IsNetworkAlive
kernel32
GlobalFindAtomW
FreeResource
FindNextFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
InterlockedIncrement
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
SetErrorMode
GetFileSizeEx
GetFileTime
WritePrivateProfileStringW
CompareStringW
GetStartupInfoW
SetEnvironmentVariableW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitThread
CreateThread
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCurrentDirectoryA
GetDriveTypeA
GetTimeZoneInformation
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LoadLibraryA
GetVersionExA
GetModuleHandleA
GetCurrentProcessId
GlobalAddAtomW
InterlockedDecrement
SuspendThread
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
GetModuleFileNameW
GetFullPathNameW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GlobalMemoryStatusEx
GetEnvironmentVariableW
GetSystemInfo
GetCurrentThread
UnmapViewOfFile
OpenFileMappingW
MapViewOfFile
GetVolumeInformationW
GetCurrentProcess
Module32NextW
Module32FirstW
Process32NextW
GetLongPathNameW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
lstrcmpA
lstrcmpW
LocalAlloc
lstrlenW
GetExitCodeProcess
CreateProcessW
SetLastError
OpenMutexW
CreateMutexW
GetThreadPriority
RemoveDirectoryW
GetVersionExW
LoadLibraryW
SetCurrentDirectoryW
GetCurrentDirectoryW
FreeLibrary
lstrlenA
GetACP
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
MoveFileW
WaitNamedPipeW
CreateNamedPipeW
ConnectNamedPipe
SetNamedPipeHandleState
DisconnectNamedPipe
LocalFree
FormatMessageW
GetThreadLocale
WideCharToMultiByte
GetProcAddress
GetModuleHandleW
VirtualAlloc
VirtualFree
GetTickCount
CreateEventW
WaitForSingleObject
GetTempPathW
Sleep
SetEvent
MultiByteToWideChar
CloseHandle
CreateFileW
ReadFile
SetFilePointer
GetFileSize
CreateFileA
FindClose
FindFirstFileW
DeleteFileW
SetFileAttributesW
SetFileTime
WriteFile
GetLastError
CreateDirectoryW
GetFileAttributesW
FindResourceW
LoadResource
LockResource
SizeofResource
GlobalFlags
user32
GetSysColorBrush
DestroyMenu
GetDesktopWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
ShowScrollBar
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
PtInRect
GetMenu
SystemParametersInfoA
GetWindowPlacement
CopyRect
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetLastActivePopup
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetKeyState
ValidateRect
PostQuitMessage
GetWindowTextLengthW
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
GetDlgCtrlID
GetWindowLongW
IsDialogMessageW
SetDlgItemTextW
SendDlgItemMessageW
GetDlgItem
GetWindow
CharUpperW
GetMenuState
GetMenuStringW
ExitWindowsEx
EnumWindows
GetWindowTextW
IsWindowVisible
GetWindowThreadProcessId
FindWindowExW
SystemParametersInfoW
SetActiveWindow
DrawAnimatedRects
SetMenuDefaultItem
ModifyMenuW
GetMenuItemID
GetMenuItemCount
GetSubMenu
ClientToScreen
GetCursorPos
LoadMenuW
SetCursor
DrawFocusRect
InflateRect
SetRectEmpty
GetParent
SetWindowTextW
LoadCursorW
GetActiveWindow
GetWindowRect
KillTimer
UnregisterClassW
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
PeekMessageW
UpdateWindow
GetFocus
IsWindow
SetTimer
SendMessageW
EnableWindow
GetForegroundWindow
PostMessageW
SetForegroundWindow
LoadIconW
MessageBoxW
SetWindowsHookExW
SetWindowLongW
ScreenToClient
gdi32
GetStockObject
DeleteDC
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
GetTextExtentPoint32W
ScaleWindowExtEx
SetWindowExtEx
CreateFontIndirectW
GetObjectW
DeleteObject
GetClipBox
PtVisible
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
IsValidSid
RegCreateKeyW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
ControlService
QueryServiceStatusEx
CloseServiceHandle
OpenServiceW
OpenSCManagerW
CreateWellKnownSid
RegDeleteValueW
OpenThreadToken
DuplicateToken
CheckTokenMembership
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetLengthSid
ConvertSidToStringSidW
LookupAccountNameW
CopySid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
RegCreateKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
GetUserNameW
RegQueryValueExW
RegFlushKey
RegSetValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteW
SHGetFolderPathW
SHCreateDirectoryExW
SHFileOperationW
SHAppBarMessage
Shell_NotifyIconW
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
PathStripToRootW
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
oleaut32
VariantInit
VariantChangeType
VariantClear
urlmon
URLDownloadToFileW
crypt32
CryptDecodeObject
CryptMsgClose
CertCloseStore
CertFreeCertificateContext
CryptProtectData
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CertGetNameStringW
CryptUnprotectData
wintrust
WinVerifyTrust
userenv
UnloadUserProfile
Sections
.text Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE