Z:\STUDIO\1059- virus.win.trojan\mantanani_com_hijack\mantanani_com_hijack\x64\Release\msTracer.pdb
Behavioral task
behavioral1
Sample
04e6a1d54c6f9bfe6a95796a7687d6f4_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04e6a1d54c6f9bfe6a95796a7687d6f4_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
04e6a1d54c6f9bfe6a95796a7687d6f4_JaffaCakes118
-
Size
269KB
-
MD5
04e6a1d54c6f9bfe6a95796a7687d6f4
-
SHA1
33efd9133d94d803664f71109c8c0159cea2ccb4
-
SHA256
f062341697979fdf10bd4b9c1d06cddc455453f827795a7f62431aab1870ca9f
-
SHA512
dd1564ee6813f9409082c8ee177a0544460c62219fd5c0ed6ba0abebb4da520feae62c8d574bafd1e8a9e74e5b2920da426d8c897a9d7a1f176094f6185772ca
-
SSDEEP
6144:FTdochbDK1aPBNaotanzwDH/yvjEp5ERAPzBn5aNyP7VL:MxfoIzwijEkGhMeVL
Malware Config
Signatures
-
Detect Mystic stealer payload 1 IoCs
Processes:
resource yara_rule sample mystic_family -
Mystic family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 04e6a1d54c6f9bfe6a95796a7687d6f4_JaffaCakes118
Files
-
04e6a1d54c6f9bfe6a95796a7687d6f4_JaffaCakes118.dll windows:5 windows x64 arch:x64
f20558ca190830b0f1c5589fba2d2d10
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
lstrlenA
GetProcAddress
WideCharToMultiByte
GetEnvironmentVariableA
GetShortPathNameA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
MoveFileA
Sleep
LoadLibraryA
GetTickCount
LocalFree
CreateFileW
FlushFileBuffers
GetStringTypeW
LCMapStringW
GetLastError
HeapFree
HeapAlloc
GetCurrentThreadId
FlsSetValue
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
DecodePointer
EncodePointer
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
RaiseException
RtlPcToFileHeader
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
FlsGetValue
FlsFree
SetLastError
FlsAlloc
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
HeapSize
HeapReAlloc
SetStdHandle
WriteConsoleW
MultiByteToWideChar
advapi32
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegOpenKeyExA
RegRenameKey
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ