WMPBAND.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_79bd6958c6e2558d901870aeb4deed3c.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_79bd6958c6e2558d901870aeb4deed3c
-
Size
200KB
-
MD5
79bd6958c6e2558d901870aeb4deed3c
-
SHA1
a8244ba1aa2937b84ab5cf7cf83b043a88dc0058
-
SHA256
4518f221c15d51d10696f14659db1c2e233077b74ab6d6fcf3978690728e92da
-
SHA512
92645ce3057712d52f83e9954f204047c69e8e0f24132acefff85fbe32e1d56a0d802ad07c21c4dce5b07a51802be6410b8103c8fd07094ccea119874b89a000
-
SSDEEP
3072:J0q0LA67ygN3R3zsc3rM7Q3AnxzBdDOq2BMgNEurvY9ef4l8q0:mq0LX/3waSxvDD2SJPefd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_79bd6958c6e2558d901870aeb4deed3c
Files
-
JaffaCakes118_79bd6958c6e2558d901870aeb4deed3c.dll regsvr32 windows:5 windows x86 arch:x86
0e236cd419ff889fa0c0d7fe03414b0f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetCurrentProcess
SetProcessWorkingSetSize
GlobalDeleteAtom
GlobalAddAtomW
RaiseException
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcmpiW
GetModuleFileNameW
GetModuleHandleW
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
lstrlenA
lstrcpynW
CompareStringW
GetVersionExW
WaitForSingleObject
GetExitCodeThread
SetLastError
QueryDosDeviceW
GetVersion
CreateFileA
DeviceIoControl
CreateFileW
GetDriveTypeW
lstrcpyW
GetLastError
WideCharToMultiByte
MultiByteToWideChar
Sleep
CloseHandle
CompareStringA
GetFileAttributesW
SetErrorMode
CreateMutexW
msvcrt
_wcsnicmp
wcslen
wcschr
wcscmp
??2@YAPAXI@Z
_initterm
_adjust_fdiv
__dllonexit
_onexit
malloc
memmove
_purecall
??3@YAXPAX@Z
wcsstr
towupper
_wtoi
iswdigit
_wtol
iswspace
_vsnwprintf
_except_handler3
free
wcsncpy
_snwprintf
_beginthreadex
_wcsicmp
wcsncmp
wcsrchr
wcspbrk
uxtheme
CloseThemeData
OpenThemeData
DrawThemeParentBackground
advapi32
RegQueryValueExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
ole32
RegisterDragDrop
RevokeDragDrop
StringFromCLSID
CoTaskMemFree
CoCreateInstance
OleLockRunning
CoUnmarshalInterface
CoMarshalInterface
CreateStreamOnHGlobal
oleaut32
SysAllocString
SysFreeString
SysAllocStringLen
LoadTypeLi
RegisterTypeLi
SysStringLen
LoadRegTypeLi
VariantClear
VariantInit
VariantCopy
VariantChangeType
user32
GetWindowLongW
SetWindowLongW
BeginPaint
EndPaint
UnregisterClassW
DestroyAcceleratorTable
GetClientRect
CreateAcceleratorTableW
DefWindowProcW
InvalidateRgn
InvalidateRect
SetFocus
GetFocus
IsWindow
DestroyWindow
GetDC
ReleaseDC
KillTimer
SetTimer
UnregisterHotKey
SetRect
EqualRect
GetWindowRect
GetWindow
GetTopWindow
FillRect
SetLayeredWindowAttributes
GetDesktopWindow
GetClassNameA
GetWindowThreadProcessId
CreateWindowExW
RegisterHotKey
IsIconic
GetParent
SendMessageTimeoutA
RegisterClassW
LoadCursorW
CharNextW
LoadStringW
PostMessageW
ShowWindow
GetClassNameW
FindWindowW
EnumWindows
SetForegroundWindow
SendMessageW
GetCursorPos
IsWindowVisible
CharNextA
GetAsyncKeyState
SetWindowPos
gdi32
GetDeviceCaps
shell32
ShellExecuteExW
shlwapi
PathGetCharTypeA
PathGetCharTypeW
mpr
WNetGetConnectionW
WNetCancelConnection2W
WNetAddConnection2W
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE