d:\workspace\xiaobai.new\client\trunk\tools\tao123_SetupOL\release\tao123_SetupOL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e13cb5a018c802564709d0ec288f3247_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e13cb5a018c802564709d0ec288f3247_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e13cb5a018c802564709d0ec288f3247_JaffaCakes118
-
Size
64KB
-
MD5
e13cb5a018c802564709d0ec288f3247
-
SHA1
3fd2bc15cf404740822041ed5515f4389ff3ac72
-
SHA256
3bb5448265ead297af196fd2cbf5e379c761e60934d991fea02e98a012fdba9e
-
SHA512
ac4c0318c97fcf1787b63f208b473771c30e6f27e5bac17473a291936e658dc815c609d747b38ec47c78846f9402e422b98a9f3b1ef0e18acf8380db8d3d298b
-
SSDEEP
1536:/yoA+cEztnsAOU0VfeZBGcMb27rznYn6win3cQk7Qaa3U:Xc4NsAOU0VfeZBzr3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e13cb5a018c802564709d0ec288f3247_JaffaCakes118
Files
-
e13cb5a018c802564709d0ec288f3247_JaffaCakes118.exe windows:4 windows x86 arch:x86
6f698a0c5050133d261966d33ee7ac71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc80u
ord566
ord777
ord265
ord1197
ord280
ord577
ord774
ord283
ord896
ord899
ord3842
ord1479
ord2260
ord282
ord5524
ord776
ord6161
ord6700
ord4100
ord1472
ord266
ord3990
ord764
ord762
ord757
ord293
msvcr80
_configthreadlocale
_initterm_e
_initterm
__winitenv
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_snwprintf_s
_wstrtime_s
_wremove
_vsnwprintf_s
_wstrdate_s
_wrename
__setusermatherr
wcsncpy
_invalid_parameter_noinfo
wprintf
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
wcsrchr
wcsncmp
swprintf_s
??0exception@std@@QAE@ABV01@@Z
fclose
vswprintf_s
fread
_wfopen
_time64
strncpy_s
strchr
__CxxFrameHandler3
memset
_CxxThrowException
_adjust_fdiv
strrchr
strcpy_s
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_vsnwprintf
_lock
memcpy
kernel32
GetTempPathW
GetTempFileNameW
DeleteFileW
GetPrivateProfileStringW
CreateFileW
GetFileSize
GetCommandLineW
CloseHandle
GetModuleHandleW
WideCharToMultiByte
WriteFile
GetModuleFileNameW
FindFirstFileW
GetModuleFileNameA
GetProcessHeap
InterlockedDecrement
lstrlenW
FormatMessageW
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
OutputDebugStringW
MoveFileW
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetPrivateProfileIntW
SetFilePointer
FindClose
user32
wsprintfW
SendMessageW
LoadAcceleratorsW
shell32
ShellExecuteW
SHCreateDirectoryExW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
OleRun
oleaut32
VariantClear
SysAllocString
SysFreeString
GetErrorInfo
urlmon
URLDownloadToFileW
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ