c:\u\n\s\3120\Win32vc\asc\PRD\exe\AimmsCOM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c2ab5835bc9d88b08316b7ad27c4e89f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c2ab5835bc9d88b08316b7ad27c4e89f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c2ab5835bc9d88b08316b7ad27c4e89f_JaffaCakes118
-
Size
158KB
-
MD5
c2ab5835bc9d88b08316b7ad27c4e89f
-
SHA1
84a3fc9712e33335d5e7d1555e0ff337e5a38c73
-
SHA256
4d4992c61557a00f3475e284e8db183a75898b26fcdeac7f145ef5ea8d0108e2
-
SHA512
645b3f00eef56499c8c2df242475e2216dfb30b40fde9a39c2253b4f590f938deee68e626d5f4f98cb7c50a230bbd68ce56e867dc8210fdbf1825190a7378cb9
-
SSDEEP
3072:nEp0SCi3T5EWlfpmMfrAOZM22ceJC8YxONirY8iTsZlXoWwG1d7ENF:00SzlzXrABEWYxONirY8iTsZlXoWw9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c2ab5835bc9d88b08316b7ad27c4e89f_JaffaCakes118
Files
-
c2ab5835bc9d88b08316b7ad27c4e89f_JaffaCakes118.exe windows:4 windows x86 arch:x86
ad2930a4c0c3b3305892dd03ef747759
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
libaimms
_AimmsAttributeFlags@8
_AimmsAPILastError@8
_AimmsControlGet@4
_AimmsIdentifierEmpty@4
_AimmsAttributeName@8
_AimmsIdentifierDataVersion@8
_AimmsIdentifierUpdate@4
_AimmsSetAddTupleToCompoundRecursive@12
_AimmsSetAddTupleToCompound@12
_AimmsSetTupleToCompound@12
_AimmsSetCompoundToTuple@12
_AimmsSetDeleteElement@8
_AimmsSetAddElementRecursive@12
_AimmsSetAddElement@12
_AimmsSetOrdinalToName@12
_AimmsSetNameToOrdinal@12
_AimmsSetRenameElement@12
_AimmsAttributeCompoundDimension@8
_AimmsAttributeCompoundDomain@8
_AimmsServerProjectOpen@8
_AimmsProjectOpen@8
_AimmsProjectWindow@4
_AimmsProjectClose@8
_AimmsProcedureAsyncRunDelete@4
_AimmsProcedureRun@16
_AimmsProcedureHandleCreate@16
_AimmsProcedureHandleDelete@4
_AimmsValueNextMulti@16
_AimmsValueAssignMulti@16
_AimmsValueAssign@12
_AimmsValueRetrieve@12
_AimmsSetElementToName@12
_AimmsAttributeStorage@8
_AimmsAttributeType@8
_AimmsAttributeElementRange@8
_AimmsIdentifierHandleCreate@20
_AimmsAttributeDimension@12
_AimmsSetNameToElement@12
_AimmsSetOrdinalToElement@12
_AimmsSetElementToOrdinal@12
_AimmsValueNext@12
_AimmsAttributeDefault@8
_AimmsValueCard@8
_AimmsAttributeCallDomain@8
_AimmsAttributeDeclarationDomain@8
_AimmsControlRelease@0
_AimmsIdentifierHandleDelete@4
_AimmsValueResetHandle@4
_AimmsIdentifierCleanup@4
kernel32
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
UnhandledExceptionFilter
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapFree
GetProcessHeap
GetVersionExA
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
ProcessIdToSessionId
GetCommandLineA
LoadLibraryExA
LoadResource
SizeofResource
FreeLibrary
SetEvent
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
CreateEventA
CreateThread
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
Sleep
WaitForSingleObject
CloseHandle
lstrcmpiA
lstrlenA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
FindResourceA
oleaut32
SafeArrayCopy
SafeArrayGetUBound
SafeArrayGetVartype
SafeArrayDestroy
SafeArrayUnlock
VarBstrCat
LoadRegTypeLi
SafeArrayPutElement
SafeArrayGetLBound
SafeArrayGetElement
SysStringByteLen
SysAllocStringByteLen
SafeArrayCreate
CreateErrorInfo
SetErrorInfo
SysAllocStringLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetDim
VariantChangeType
VariantCopy
VariantClear
VariantInit
SysFreeString
SafeArrayLock
user32
CharUpperA
PostThreadMessageA
TranslateMessage
DispatchMessageA
GetMessageA
ShowWindow
IsWindow
SetTimer
UnregisterClassA
CharNextA
advapi32
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoInitialize
CoUninitialize
StringFromGUID2
CoCreateInstance
msvcr80
_fullpath
memmove
bsearch
qsort
calloc
?terminate@@YAXXZ
_except_handler4_common
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
strcpy_s
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
free
malloc
??_V@YAXPAX@Z
__CxxFrameHandler3
memcpy_s
_CxxThrowException
??3@YAXPAX@Z
wcsncpy_s
strncpy_s
strcat_s
_resetstkoflw
_recalloc
??_U@YAPAXI@Z
memset
_localtime64
_time64
wcstombs
__p__commode
__p__fmode
__set_app_type
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_controlfp_s
_purecall
fclose
fprintf
strftime
fopen
vsprintf
??2@YAPAXI@Z
wcsncmp
exit
wcsstr
memcpy
strchr
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ