d:\1\新建文件夹 (3)\findpiccolor\release\findpiccolor.pdb
Behavioral task
behavioral1
Sample
FindPic.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
FindPic.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
进进AVA透视.exe
Resource
win7-20240903-en
General
-
Target
e05f704d43307be6e8985b9b4672356d_JaffaCakes118
-
Size
480KB
-
MD5
e05f704d43307be6e8985b9b4672356d
-
SHA1
df4ee26572e3646f325796a7ee2014e71138d08e
-
SHA256
ab9a7336ad076e42d1f017336181eb5009402be0a1b25f11d5c6912deba92f9f
-
SHA512
c2583c10a91d423ee97a2463056d7e0ccac013a7f7910536721559bc160e6fd8e8cacc34f69586767d4c2bf753550f16a6064f5c5556ed6da4d5745bc2e88013
-
SSDEEP
12288:jCU4d/bKHxMSp/sCFQlUGJXZHwyvxGgon:jvk/bYxMSpcKGJpV4g+
Malware Config
Signatures
-
resource yara_rule static1/unpack001/进进AVA透视.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/FindPic.dll unpack001/进进AVA透视.exe unpack002/out.upx
Files
-
e05f704d43307be6e8985b9b4672356d_JaffaCakes118.rar
-
FindPic.dll.dll windows:4 windows x86 arch:x86
fa62b4a40d0cc57c7c716036452d19d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LoadLibraryA
CloseHandle
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
GlobalFree
DisableThreadLibraryCalls
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetProcAddress
GlobalUnlock
MultiByteToWideChar
ReadFile
GetFileAttributesA
GlobalAlloc
GlobalLock
FreeLibrary
GetFileSize
QueryPerformanceCounter
CreateFileA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
user32
DestroyIcon
FillRect
DrawIconEx
CopyImage
GetIconInfo
GetDC
ReleaseDC
GetSystemMetrics
LoadImageA
gdi32
DeleteDC
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetSystemPaletteEntries
GetObjectA
CreateSolidBrush
BitBlt
shell32
ExtractIconA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
msvcr80
__CppXcptFilter
_except_handler4_common
_stricmp
_onexit
free
malloc
atoi
strtol
tolower
strncpy
strrchr
toupper
isxdigit
_encode_pointer
_malloc_crt
_encoded_null
_decode_pointer
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
_strnicmp
_crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
Exports
Exports
FindColor
FindPic
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 798B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
进进AVA透视.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 732KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 474KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 540KB - Virtual size: 538KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 348KB - Virtual size: 346KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ