wbemtest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b69f59b86316252d25ab4e92aceeb938_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b69f59b86316252d25ab4e92aceeb938_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b69f59b86316252d25ab4e92aceeb938_JaffaCakes118
-
Size
132KB
-
MD5
b69f59b86316252d25ab4e92aceeb938
-
SHA1
1ba9dd4470271fc08f17c093e042b0ab774e17d3
-
SHA256
d89aeef4db022378222241f37cefbd026244ba49b5a5ad8914c5ff109791fea2
-
SHA512
a7a534e29cf28df5c01868e46ea7d7276483804c1dcbaa869a207273f86848379a4d4181254f4efb06bed1bf5afe2c913dbaaadbcdbc02b5a8bb57b7755f8d54
-
SSDEEP
3072:L0Fp2XAdff3+Jg/P4sxpflta2c935a8Uwpqt:oOXAdff3Cg7uhUgqt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b69f59b86316252d25ab4e92aceeb938_JaffaCakes118
Files
-
b69f59b86316252d25ab4e92aceeb938_JaffaCakes118.exe windows:5 windows x86 arch:x86
c8c30f1d84758827d25de24feff78fe2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
atoi
_finite
atol
wcstombs
wcslen
wcscpy
sscanf
mbstowcs
sprintf
wcsncpy
wcscspn
_mbsinc
qsort
strchr
_vsnprintf
_wtol
strstr
setlocale
wcschr
wcscat
swprintf
_snprintf
isspace
iswspace
__CxxFrameHandler
advapi32
GetTokenInformation
OpenThreadToken
OpenProcessToken
AdjustTokenPrivileges
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
kernel32
GetVersionExA
SetLastError
HeapAlloc
GetProcessHeap
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
lstrlenW
GetStringTypeExA
HeapFree
SwitchToThread
CreateEventA
SetEvent
GetCurrentProcess
GetCurrentThread
CloseHandle
GetWindowsDirectoryA
CompareStringA
InitializeCriticalSection
InterlockedDecrement
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
LCMapStringW
GetStartupInfoA
GetModuleHandleA
HeapReAlloc
GetProcAddress
LoadLibraryA
GetCurrentProcessId
user32
SetWindowLongA
DestroyWindow
FindWindowExA
IsDialogMessageA
IsWindow
MessageBoxA
GetWindowThreadProcessId
EnumWindows
GetDlgCtrlID
GetDlgItemTextW
wsprintfA
GetWindowTextLengthA
InvalidateRect
UpdateWindow
IsDlgButtonChecked
GetMessageA
TranslateMessage
PeekMessageA
DispatchMessageA
GetWindowLongA
PostMessageA
GetDlgItem
SetDlgItemTextA
ShowWindow
CreateDialogParamA
SetFocus
DialogBoxParamA
GetFocus
SetWindowTextA
EnableWindow
SendMessageA
GetWindowTextA
GetDlgItemTextA
LoadStringA
CheckRadioButton
SendDlgItemMessageA
EndDialog
MoveWindow
GetWindowRect
GetClientRect
GetDesktopWindow
MsgWaitForMultipleObjects
PostQuitMessage
SetCursor
LoadCursorA
wbemcomn
??0CVarVector@@QAE@XZ
??4CVarVector@@QAEAAV0@AAV0@@Z
??0WString@@QAE@PAGH@Z
?Size@CVarVector@@QAEHXZ
?FillCVarAt@CVarVector@@QAEXHAAVCVar@@@Z
??YWString@@QAEAAV0@ABV0@@Z
?SetUnknown@CVar@@QAEXPAUIUnknown@@@Z
?FillVariant@CVar@@QAEXPAUtagVARIANT@@H@Z
??1CVar@@QAE@XZ
?RemoveAt@CFlexArray@@QAEHH@Z
??4WString@@QAEAAV0@PBG@Z
?GetLPSTR@WString@@QBEPADXZ
?RemoveAt@CVarVector@@QAEHH@Z
??1CVarVector@@QAE@XZ
?SetBSTR@CVar@@QAEHPAG@Z
??0CVarVector@@QAE@HHH@Z
?SetVarVector@CVar@@QAEXPAVCVarVector@@H@Z
?Empty@CVar@@QAEXXZ
?Add@CVarVector@@QAEHAAVCVar@@@Z
?GetOleType@CVar@@QAEHXZ
??YWString@@QAEAAV0@PBG@Z
??YWString@@QAEAAV0@G@Z
??0CFlexArray@@QAE@HH@Z
??1CFlexArray@@QAE@XZ
?InsertAt@CFlexArray@@QAEHHPAX@Z
?GetNewVariant@CVar@@QAEPAUtagVARIANT@@XZ
??0WString@@QAE@PBD@Z
??4WString@@QAEAAV0@ABV0@@Z
??0WString@@QAE@XZ
?DeleteString@WString@@AAEXPAG@Z
?SetVariant@CVar@@QAEHPAUtagVARIANT@@H@Z
?Init@CVar@@AAEXXZ
?WbemMemFree@CWin32DefaultArena@@SAHPAX@Z
?WbemMemAlloc@CWin32DefaultArena@@SAPAXK@Z
??4CVar@@QAEAAV0@ABV0@@Z
oleaut32
SysAllocStringLen
SysStringLen
GetErrorInfo
SysAllocString
VariantInit
SysFreeString
VariantClear
ole32
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE