c:\Users\Ryan\Documents\Visual Studio 2005\Projects\Omega Injector\release\Omega Injector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bbd2665749ef616a3748702f3612b038_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbd2665749ef616a3748702f3612b038_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bbd2665749ef616a3748702f3612b038_JaffaCakes118
-
Size
364KB
-
MD5
bbd2665749ef616a3748702f3612b038
-
SHA1
f2eeb71f2a603fd5e1bd95d2b034d35fcac99d98
-
SHA256
7ba76f676d002e124cab0ba1f5e01fce8fcc0e06ff146db629b015ead9a21218
-
SHA512
54793809fce245c0d2b63d4adbabbb535fcefe46b2c9dd86855531ee9be0dda73b7920ca84599aca2a53084d0f9023d555896bb0ec626570bf68f717bfe9b416
-
SSDEEP
6144:i/fQumMKpYeO8MMNNkpXbAfATVXrJje9NidZ:iHJmJNNkJcfATVXrJiq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbd2665749ef616a3748702f3612b038_JaffaCakes118
Files
-
bbd2665749ef616a3748702f3612b038_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea820bb85b31a05975a86c1bec803f24
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
ExitProcess
RaiseException
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
lstrlenA
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedDecrement
GetVersionExW
FormatMessageW
LocalFree
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
MulDiv
GlobalUnlock
GlobalFree
FreeResource
lstrlenW
WritePrivateProfileStringW
GetCurrentProcessId
GetLastError
SetLastError
GlobalAddAtomW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameW
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
WideCharToMultiByte
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GetModuleHandleW
CloseHandle
CreateFileW
CreateRemoteThread
WriteProcessMemory
GetExitCodeProcess
FindResourceW
VirtualAllocEx
GetModuleHandleA
LoadResource
GetProcAddress
LockResource
SuspendThread
SizeofResource
Thread32Next
OpenProcess
ResumeThread
OpenThread
Thread32First
Sleep
Process32NextW
CreateToolhelp32Snapshot
HeapCreate
MultiByteToWideChar
user32
LoadCursorW
GetSysColorBrush
ShowWindow
SetWindowTextW
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
UnregisterClassW
GetDlgItem
GetNextDlgTabItem
DestroyMenu
EndDialog
GetWindowThreadProcessId
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
PostMessageW
PostQuitMessage
IsIconic
LoadIconW
EnableWindow
SendMessageW
DrawIcon
KillTimer
GetClientRect
SetTimer
GetSystemMetrics
UnregisterClassA
gdi32
DeleteDC
GetStockObject
TextOutW
GetDeviceCaps
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
CreateBitmap
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
ExtTextOutW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegQueryValueW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathFindExtensionW
oleaut32
VariantClear
VariantChangeType
VariantInit
dbghelp
MiniDumpWriteDump
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE