wbemtest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
01ef4beaaf559eab36a3e42dfc1762a3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01ef4beaaf559eab36a3e42dfc1762a3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
01ef4beaaf559eab36a3e42dfc1762a3_JaffaCakes118
-
Size
150KB
-
MD5
01ef4beaaf559eab36a3e42dfc1762a3
-
SHA1
b532d6532618efeeed9aab503ccd4624b4236fdc
-
SHA256
c94ce3ef25ef7e317b78e664f488387dd1a02e5fd34adf52e64b99396725f17c
-
SHA512
b0bd2e204b6c2589eaad0218f29c7916685475a7f1f65a984d551256ca81fb8b74985f2c5f5e8b42e59b26bf0ea77e67b9435c8a364580f98105fff2b0292da7
-
SSDEEP
3072:c0Fp2XAdff3+JgLO4V4pflta2c93yxd0U4SSRZc0V:fOXAdff3Cgv1nUfAB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01ef4beaaf559eab36a3e42dfc1762a3_JaffaCakes118
Files
-
01ef4beaaf559eab36a3e42dfc1762a3_JaffaCakes118.exe windows:5 windows x86 arch:x86
c8c30f1d84758827d25de24feff78fe2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
atoi
_finite
atol
wcstombs
wcslen
wcscpy
sscanf
mbstowcs
sprintf
wcsncpy
wcscspn
_mbsinc
qsort
strchr
_vsnprintf
_wtol
strstr
setlocale
wcschr
wcscat
swprintf
_snprintf
isspace
iswspace
__CxxFrameHandler
advapi32
GetTokenInformation
OpenThreadToken
OpenProcessToken
AdjustTokenPrivileges
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
kernel32
GetVersionExA
SetLastError
HeapAlloc
GetProcessHeap
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
lstrlenW
GetStringTypeExA
HeapFree
SwitchToThread
CreateEventA
SetEvent
GetCurrentProcess
GetCurrentThread
CloseHandle
GetWindowsDirectoryA
CompareStringA
InitializeCriticalSection
InterlockedDecrement
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
LCMapStringW
GetStartupInfoA
GetModuleHandleA
HeapReAlloc
GetProcAddress
LoadLibraryA
GetCurrentProcessId
user32
SetWindowLongA
DestroyWindow
FindWindowExA
IsDialogMessageA
IsWindow
MessageBoxA
GetWindowThreadProcessId
EnumWindows
GetDlgCtrlID
GetDlgItemTextW
wsprintfA
GetWindowTextLengthA
InvalidateRect
UpdateWindow
IsDlgButtonChecked
GetMessageA
TranslateMessage
PeekMessageA
DispatchMessageA
GetWindowLongA
PostMessageA
GetDlgItem
SetDlgItemTextA
ShowWindow
CreateDialogParamA
SetFocus
DialogBoxParamA
GetFocus
SetWindowTextA
EnableWindow
SendMessageA
GetWindowTextA
GetDlgItemTextA
LoadStringA
CheckRadioButton
SendDlgItemMessageA
EndDialog
MoveWindow
GetWindowRect
GetClientRect
GetDesktopWindow
MsgWaitForMultipleObjects
PostQuitMessage
SetCursor
LoadCursorA
wbemcomn
??0CVarVector@@QAE@XZ
??4CVarVector@@QAEAAV0@AAV0@@Z
??0WString@@QAE@PAGH@Z
?Size@CVarVector@@QAEHXZ
?FillCVarAt@CVarVector@@QAEXHAAVCVar@@@Z
??YWString@@QAEAAV0@ABV0@@Z
?SetUnknown@CVar@@QAEXPAUIUnknown@@@Z
?FillVariant@CVar@@QAEXPAUtagVARIANT@@H@Z
??1CVar@@QAE@XZ
?RemoveAt@CFlexArray@@QAEHH@Z
??4WString@@QAEAAV0@PBG@Z
?GetLPSTR@WString@@QBEPADXZ
?RemoveAt@CVarVector@@QAEHH@Z
??1CVarVector@@QAE@XZ
?SetBSTR@CVar@@QAEHPAG@Z
??0CVarVector@@QAE@HHH@Z
?SetVarVector@CVar@@QAEXPAVCVarVector@@H@Z
?Empty@CVar@@QAEXXZ
?Add@CVarVector@@QAEHAAVCVar@@@Z
?GetOleType@CVar@@QAEHXZ
??YWString@@QAEAAV0@PBG@Z
??YWString@@QAEAAV0@G@Z
??0CFlexArray@@QAE@HH@Z
??1CFlexArray@@QAE@XZ
?InsertAt@CFlexArray@@QAEHHPAX@Z
?GetNewVariant@CVar@@QAEPAUtagVARIANT@@XZ
??0WString@@QAE@PBD@Z
??4WString@@QAEAAV0@ABV0@@Z
??0WString@@QAE@XZ
?DeleteString@WString@@AAEXPAG@Z
?SetVariant@CVar@@QAEHPAUtagVARIANT@@H@Z
?Init@CVar@@AAEXXZ
?WbemMemFree@CWin32DefaultArena@@SAHPAX@Z
?WbemMemAlloc@CWin32DefaultArena@@SAPAXK@Z
??4CVar@@QAEAAV0@ABV0@@Z
oleaut32
SysAllocStringLen
SysStringLen
GetErrorInfo
SysAllocString
VariantInit
SysFreeString
VariantClear
ole32
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE