C:\prog\Deliverables\BeyondQLB\BeyondQLB_6_50\Release\callnv32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0288c87e5c034415afd9a660d550a5d1.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_0288c87e5c034415afd9a660d550a5d1
-
Size
375KB
-
MD5
0288c87e5c034415afd9a660d550a5d1
-
SHA1
5eafc101d55812b7343bc9c46c14722bfcb38e63
-
SHA256
05f7d2713db56804e2a985c3cf62141db7e646909c58c0de189e9aa6a15fc974
-
SHA512
d5a6bb3844e869d6a9dfd710b37ddfab1310e59497ade23690df47bdf0cb934a001545fc2e02c553b2aed2f8500a71f7437ab59d6c66e6fd07ba123b35967a77
-
SSDEEP
6144:h6eX4uyIJDTtQIO5xK4byFcF1gWbgaLW3P+BZd0Q0YFwRwjb4SIGYDh6WJoPE:hwujWZyFcF1rbga63PcZdx5jJIGYV6Wi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_0288c87e5c034415afd9a660d550a5d1
Files
-
JaffaCakes118_0288c87e5c034415afd9a660d550a5d1.exe windows:5 windows x86 arch:x86
0faf7d4e702000c8e8601bbfc4f7f0f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
RtlUnwind
ExitProcess
RaiseException
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
HeapAlloc
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetStartupInfoW
GetFileTime
GetFileSizeEx
GetFileAttributesW
FileTimeToLocalFileTime
GetTickCount
SetErrorMode
CreateFileW
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFindAtomW
GetVersionExW
LoadLibraryA
GetVersionExA
FileTimeToSystemTime
GetThreadLocale
lstrlenA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
CompareStringW
GlobalFlags
GetModuleHandleA
InterlockedDecrement
GetCurrentProcessId
GlobalAddAtomW
CloseHandle
GetLastError
SetLastError
GlobalUnlock
FormatMessageW
LocalFree
MulDiv
WritePrivateProfileStringW
FreeResource
GlobalFree
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetModuleFileNameW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
CompareStringA
MultiByteToWideChar
WideCharToMultiByte
InterlockedExchange
GlobalLock
GlobalAlloc
FreeLibrary
GetModuleHandleW
GetProcAddress
lstrlenW
Sleep
FindResourceW
LoadResource
LockResource
SizeofResource
UnhandledExceptionFilter
lstrcmpW
user32
UnregisterClassW
RegisterClipboardFormatW
EndDialog
CreateDialogIndirectParamW
PostThreadMessageW
CharUpperW
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageA
WinHelpW
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
SetActiveWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetSysColorBrush
MessageBeep
GetTopWindow
GetNextDlgTabItem
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
GetClientRect
EqualRect
IntersectRect
CopyAcceleratorTableW
SetRect
IsRectEmpty
OffsetRect
CopyRect
CharNextW
SetFocus
ShowWindow
MoveWindow
SetWindowLongW
IsWindow
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
GetWindowTextW
SetWindowTextW
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringW
DrawTextExW
EnumDisplaySettingsW
PostMessageW
PostQuitMessage
SetWindowPos
DrawTextW
TabbedTextOutW
UnhookWindowsHookEx
GetDesktopWindow
ReleaseCapture
LoadCursorW
GetCapture
SetCapture
DestroyMenu
ClientToScreen
GetWindowThreadProcessId
IsChild
MapDialogRect
GetParent
SetWindowContextHelpId
GetWindow
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
CheckMenuItem
EnableMenuItem
ModifyMenuW
SendMessageW
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
ValidateRect
GetCursorPos
PeekMessageW
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageW
TranslateMessage
GetMessageW
CallNextHookEx
SetWindowsHookExW
SetCursor
MessageBoxW
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongW
CallWindowProcW
gdi32
GetStockObject
GetBkColor
GetTextColor
DeleteDC
GetRgnBox
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
CreateRectRgnIndirect
GetDeviceCaps
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
Escape
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegDeleteKeyW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
CoRegisterMessageFilter
CoGetClassObject
oleaut32
SysAllocStringLen
SysStringLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
SafeArrayDestroy
SysAllocString
VariantChangeType
VariantCopy
VariantInit
SysFreeString
Sections
.text Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CONST Size: 512B - Virtual size: 31B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE