wmprph.pdb
Static task
static1
Behavioral task
behavioral1
Sample
404dc1c58eb45098c8f4e4120b160e89_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
404dc1c58eb45098c8f4e4120b160e89_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
404dc1c58eb45098c8f4e4120b160e89_JaffaCakes118
-
Size
62KB
-
MD5
404dc1c58eb45098c8f4e4120b160e89
-
SHA1
3862a35064cef6d7cda06a756b096808eaff27c7
-
SHA256
b6d5060d7eeaa6dd05356cbae0d0a5831889187862427e57d1af5bc08ae54a8c
-
SHA512
b0d942ab1dd9bce45def576fffca7d40f3be712f815736e484514ad106efc6986ec215cc156fb299904652db5dcbb67cd57d1aeca621b0433a4ba9d8369db9d4
-
SSDEEP
768:hFGQ9i37val++Y923GM+EhfobrHbhmy+ZjcGATDNkdoE0QypLIsKG4oLVACm:Ptl++e239hAbn0yu4GUQy6oLVAl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 404dc1c58eb45098c8f4e4120b160e89_JaffaCakes118
Files
-
404dc1c58eb45098c8f4e4120b160e89_JaffaCakes118.exe windows:6 windows x86 arch:x86
c5cf1dc6a1cdfa90d5f921eba0056bd7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
TraceMessage
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
RegEnumKeyExW
RegQueryValueExW
kernel32
SetLastError
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersionExW
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MultiByteToWideChar
lstrcpyW
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
LoadLibraryW
FlushInstructionCache
lstrcmpiW
GetCurrentThreadId
SetEvent
CloseHandle
WaitForSingleObject
lstrcpynW
GetModuleFileNameW
FreeLibrary
CreateThread
CreateEventW
lstrcatW
lstrlenA
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
Sleep
GetCommandLineW
lstrcmpW
EnterCriticalSection
LeaveCriticalSection
lstrlenW
DeleteFileW
GetModuleHandleW
GetLastError
RaiseException
InterlockedIncrement
HeapDestroy
GetCurrentProcess
CompareStringW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetProcAddress
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
VirtualFree
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
ExpandEnvironmentStringsW
gdi32
GetObjectW
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
CreateSolidBrush
GetStockObject
user32
CreateAcceleratorTableW
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
RegisterWindowMessageW
CharNextW
PostThreadMessageW
CharPrevW
DispatchMessageW
GetMessageW
EndPaint
GetWindow
ReleaseCapture
GetClassNameW
GetDlgItem
wsprintfW
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
CallWindowProcW
GetSysColor
DestroyWindow
UnregisterClassW
SetWindowPos
GetWindowLongW
SetWindowLongW
SetClassLongW
GetFocus
IsWindow
BeginPaint
GetParent
FillRect
SetFocus
GetDesktopWindow
GetClassInfoExW
LoadCursorW
RegisterClassExW
SendMessageW
SetParent
ShowWindow
PostMessageW
CreateWindowExW
DefWindowProcW
msvcrt
_exit
wcsrchr
wcschr
wcspbrk
_controlfp
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_vsnwprintf
_cexit
__wgetmainargs
_purecall
realloc
free
malloc
memcpy
??_U@YAPAXI@Z
??2@YAPAXI@Z
_ftol2
??_V@YAXPAX@Z
??3@YAXPAX@Z
memset
ole32
CoCreateInstance
CoTaskMemFree
StringFromCLSID
CLSIDFromProgID
CLSIDFromString
CoTaskMemAlloc
OleLockRunning
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoRegisterClassObject
CoRevokeClassObject
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
oleaut32
VarUI4FromStr
RegisterTypeLi
SysAllocString
LoadTypeLi
OleCreateFontIndirect
VariantClear
SysAllocStringLen
LoadRegTypeLi
SysStringLen
SysFreeString
shell32
ord155
SHParseDisplayName
SHCreateItemFromIDList
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE