C:\Shaiya Terror\Shaiya Terror\mask.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f58f99e9d62b7626b612be6bce4980b7_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f58f99e9d62b7626b612be6bce4980b7_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f58f99e9d62b7626b612be6bce4980b7_JaffaCakes118
-
Size
212KB
-
MD5
f58f99e9d62b7626b612be6bce4980b7
-
SHA1
82d680de6dd3c5405b2054e729f11ba2e4aa37a7
-
SHA256
228274ec59d4df252066f25d53a4ab46a5faae4690fbc893cbd516bfdeaeff77
-
SHA512
0035f6af608c7b76512aadcaeb7f73f34704663e87e1de441b73529aa69bb1eb3eb11001b0c0ece5854b3bd2dad75d0928cd2b345f60b3a292c5e126a6aa1bdb
-
SSDEEP
6144:4sRcD8u1T9zltjV6XeoOow+AOqYPDixq:4sCD8u19zleeopPZixq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f58f99e9d62b7626b612be6bce4980b7_JaffaCakes118
Files
-
f58f99e9d62b7626b612be6bce4980b7_JaffaCakes118.dll windows:6 windows x86 arch:x86
9dc81b25879331bd7590a7e0c06002bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
EnterCriticalSection
GetCurrentProcess
TerminateProcess
LeaveCriticalSection
InitializeCriticalSection
GetCurrentDirectoryA
GetModuleHandleA
Sleep
DeleteFileA
CreateThread
GetProcAddress
GetPrivateProfileIntA
GetTickCount
VirtualProtect
VirtualAlloc
K32GetModuleFileNameExA
SetEndOfFile
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetLastError
WideCharToMultiByte
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetFileSizeEx
SetFilePointerEx
GetStdHandle
GetFileType
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
HeapFree
CloseHandle
HeapAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
ReadConsoleW
HeapReAlloc
user32
DispatchMessageA
ShowWindow
GetDlgItemTextA
GetWindowTextA
SetWindowTextA
MessageBoxA
TranslateMessage
GetMessageA
SetDlgItemTextA
SendMessageA
CreateDialogParamA
GetDlgItemInt
GetDlgItem
PostQuitMessage
UpdateWindow
EnableWindow
SendDlgItemMessageA
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ