c:\299_Flow\him\bell_opposite\order\Most.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb663da7d960ab7736290075b46998ef_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
eb663da7d960ab7736290075b46998ef_JaffaCakes118
-
Size
604KB
-
MD5
eb663da7d960ab7736290075b46998ef
-
SHA1
048f6ff1044ecd925654b86f8dbcc62a500691e0
-
SHA256
1c3f402651ec7acc0f84753b8a3913ec5b9abb7e0350fe4c88fce7b3ed364ec0
-
SHA512
c0e05cdc644371aef34b9641d9a493844ad347010886e2447fe44c104c75dd95e560bc5c52e315c719198f5f5c3833f699251a01b4ecaecd30d8733b534d652d
-
SSDEEP
12288:MuIBRuwMtjp4CqwqyaXPLAfx38TW9DiWUT2tq017JGoLbfW/:Dbb4wqyaDA5sTWiXT2tq07G2S/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource eb663da7d960ab7736290075b46998ef_JaffaCakes118
Files
-
eb663da7d960ab7736290075b46998ef_JaffaCakes118.dll windows:4 windows x86 arch:x86
a5fbb54a2d8e086b0b1f07a086b817fc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
CreateEventW
GetVersion
FindClose
FindNextFileW
FindFirstFileW
TlsAlloc
GetCurrentDirectoryW
VirtualProtectEx
GetSystemDirectoryW
FindFirstChangeNotificationW
GetWindowsDirectoryW
CompareStringW
CompareStringA
GetLocaleInfoW
HeapSize
GetTimeZoneInformation
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
Sleep
HeapAlloc
GetLastError
HeapFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetTimeFormatA
GetDateFormatA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
SetEnvironmentVariableA
user32
DeferWindowPos
TranslateMessage
CreateMenu
GetPropW
BeginDeferWindowPos
UnregisterHotKey
RegisterWindowMessageW
winscard
SCardReconnect
SCardLocateCardsByATRW
SCardListReaderGroupsW
SCardIsValidContext
SCardGetStatusChangeW
SCardGetAttrib
SCardEstablishContext
SCardAccessStartedEvent
SCardForgetReaderW
SCardLocateCardsW
SCardControl
SCardListReadersW
SCardIntroduceReaderGroupW
SCardForgetReaderGroupW
SCardDisconnect
SCardAddReaderToGroupW
SCardEndTransaction
SCardBeginTransaction
SCardRemoveReaderFromGroupW
SCardReleaseStartedEvent
SCardIntroduceReaderW
SCardCancel
SCardConnectW
SCardLocateCardsA
SCardReleaseContext
Exports
Exports
Growother
Minute
WordForce
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 665KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ