c:\299_Flow\him\bell_opposite\order\Most.pdb
Static task
static1
Behavioral task
behavioral1
Sample
782f3a3edfc69c661caf22286858f19e_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
782f3a3edfc69c661caf22286858f19e_JaffaCakes118
-
Size
604KB
-
MD5
782f3a3edfc69c661caf22286858f19e
-
SHA1
5e48729ded71998c5320dbe73aea54cbf6bd257d
-
SHA256
04622665ec1dccb6fabcd0d62b24747bb650aa6964a84a966a633066c840d379
-
SHA512
3f254421515f5cb0a2b6a53c9cb1bbc9966abdcc6d72ae0fcddb5df266aa5c3a8b1caf3d464e545a767b47ea27fe7b025b6dd94c8e45eeee058fea13db7cff20
-
SSDEEP
12288:KuIBaTwMtjp4CqwqyaXPLAfx38TW9DiWUT2tq017JGoLbSW/:FXb4wqyaDA5sTWiXT2tq07G2//
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 782f3a3edfc69c661caf22286858f19e_JaffaCakes118
Files
-
782f3a3edfc69c661caf22286858f19e_JaffaCakes118.dll windows:4 windows x86 arch:x86
5eb95f99453a8a6fe3d6300e286747db
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
CreateEventW
GetVersion
FindClose
FindNextFileW
FindFirstFileW
TlsAlloc
GetCurrentDirectoryW
VirtualProtectEx
GetSystemDirectoryW
FindFirstChangeNotificationW
GetWindowsDirectoryW
CompareStringW
CompareStringA
GetLocaleInfoW
HeapSize
GetTimeZoneInformation
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
Sleep
HeapAlloc
GetLastError
HeapFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetTimeFormatA
GetDateFormatA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
SetEnvironmentVariableA
user32
DeferWindowPos
TranslateMessage
CreateMenu
GetPropW
BeginDeferWindowPos
UnregisterHotKey
RegisterWindowMessageW
winscard
SCardGetStatusChangeW
SCardReconnect
SCardIsValidContext
SCardLocateCardsByATRW
SCardForgetReaderGroupW
SCardAccessStartedEvent
SCardDisconnect
SCardListReadersW
SCardIntroduceReaderGroupW
SCardForgetReaderW
SCardEndTransaction
SCardLocateCardsA
SCardLocateCardsW
SCardRemoveReaderFromGroupW
SCardReleaseContext
SCardBeginTransaction
SCardGetAttrib
SCardConnectW
SCardControl
SCardIntroduceReaderW
SCardAddReaderToGroupW
SCardReleaseStartedEvent
SCardCancel
SCardListReaderGroupsW
SCardEstablishContext
Exports
Exports
Growother
Minute
WordForce
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 665KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ