c:\299_Flow\him\bell_opposite\order\Most.pdb
Static task
static1
Behavioral task
behavioral1
Sample
df5c07b23bf94e2f37babc2600bc5c90_JaffaCakes118.dll
Resource
win7-20231129-en
General
-
Target
df5c07b23bf94e2f37babc2600bc5c90_JaffaCakes118
-
Size
604KB
-
MD5
df5c07b23bf94e2f37babc2600bc5c90
-
SHA1
f83c8d24ffe6684079538de9a9fa1dcdf0d14713
-
SHA256
f183231649f6afa787e8876c902d6d51b354fff0f2e9f218ffce0f469ad37599
-
SHA512
81939c8f263f655fc261c85087237d4b274cd2f4e2f036ae7c86c5ba15e4a8b4b43e5bcb2e7476c4fb779d1e245fa98c31dd6b0d2accbef3580b01ef3debc565
-
SSDEEP
12288:BuIBwWwMtjp4CqwqyaXPLAfx38TW9DiWUT2tq017JGoLbHW/:c2b4wqyaDA5sTWiXT2tq07G2i/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource df5c07b23bf94e2f37babc2600bc5c90_JaffaCakes118
Files
-
df5c07b23bf94e2f37babc2600bc5c90_JaffaCakes118.dll windows:4 windows x86 arch:x86
a5fbb54a2d8e086b0b1f07a086b817fc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
CreateEventW
GetVersion
FindClose
FindNextFileW
FindFirstFileW
TlsAlloc
GetCurrentDirectoryW
VirtualProtectEx
GetSystemDirectoryW
FindFirstChangeNotificationW
GetWindowsDirectoryW
CompareStringW
CompareStringA
GetLocaleInfoW
HeapSize
GetTimeZoneInformation
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
Sleep
HeapAlloc
GetLastError
HeapFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetTimeFormatA
GetDateFormatA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
SetEnvironmentVariableA
user32
DeferWindowPos
TranslateMessage
CreateMenu
GetPropW
BeginDeferWindowPos
UnregisterHotKey
RegisterWindowMessageW
winscard
SCardReconnect
SCardLocateCardsByATRW
SCardListReaderGroupsW
SCardIsValidContext
SCardGetStatusChangeW
SCardGetAttrib
SCardEstablishContext
SCardAccessStartedEvent
SCardForgetReaderW
SCardLocateCardsW
SCardControl
SCardListReadersW
SCardIntroduceReaderGroupW
SCardForgetReaderGroupW
SCardDisconnect
SCardAddReaderToGroupW
SCardEndTransaction
SCardBeginTransaction
SCardRemoveReaderFromGroupW
SCardReleaseStartedEvent
SCardIntroduceReaderW
SCardCancel
SCardConnectW
SCardLocateCardsA
SCardReleaseContext
Exports
Exports
Growother
Minute
WordForce
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 665KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ