C:\Users\el_ya\Documents\Visual Studio 2013\Projects\TDAGG3\Release\TDAgg3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb4522e0ec98f601a342fa1c86f5ff7a_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb4522e0ec98f601a342fa1c86f5ff7a_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
fb4522e0ec98f601a342fa1c86f5ff7a_JaffaCakes118
-
Size
3.0MB
-
MD5
fb4522e0ec98f601a342fa1c86f5ff7a
-
SHA1
e2a70772e05290a672e08182bdf7f8c4e0dc5775
-
SHA256
5018d4b22e0cdd06f4b720877a08c580d2922dd42ab0207fa218a4457e3a79ca
-
SHA512
10f5d218b5b4409e4af7e9ec472f12b0b64a70f6923d40dce9ba60d23a2d82cd5d9ad8f5fa793913a27dc0208ecf3ca6a5b6a19d9acb4099c4bff68211abf374
-
SSDEEP
49152:iBmcG9GvdMmid4PQkyYoH4u7+hzbdsZRSMm74Mmid4PQkyYoH4u7+fk:iU9sid4YkyTH4u7aOnSMhid4YkyTH4u7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb4522e0ec98f601a342fa1c86f5ff7a_JaffaCakes118
Files
-
fb4522e0ec98f601a342fa1c86f5ff7a_JaffaCakes118.dll windows:5 windows x86 arch:x86
885226b3491b7040b38548bfe81f4ff0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
UnmapViewOfFile
GetLastError
CloseHandle
GetTickCount
GetCurrentThread
ExitProcess
VirtualProtect
VirtualAlloc
WaitForSingleObject
ResumeThread
GetExitCodeThread
Sleep
CreateThread
CreateEventA
SetEvent
GetPrivateProfileIntA
GetModuleHandleA
GetProcAddress
TerminateThread
ReadFile
GetModuleFileNameA
SizeofResource
GetCurrentProcess
WriteFile
Thread32Next
Thread32First
FindResourceA
GetCurrentThreadId
SuspendThread
GetCurrentDirectoryA
FreeResource
OpenProcess
CreateToolhelp32Snapshot
CreateFileA
LockResource
GetNativeSystemInfo
MapViewOfFile
LoadResource
SetFileAttributesA
GetFileSize
GetThreadTimes
CreateProcessA
CreateDirectoryA
OpenThread
SetUnhandledExceptionFilter
LoadLibraryA
LoadLibraryW
DuplicateHandle
SetLastError
GetThreadContext
LoadLibraryExA
LoadLibraryExW
GetVersionExA
WriteConsoleW
SetFilePointerEx
HeapReAlloc
HeapSize
CreateFileW
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
GetProcessHeap
FreeEnvironmentStringsW
OpenFileMappingA
WritePrivateProfileStringA
GetCurrentProcessId
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
DecodePointer
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
SetThreadContext
FlushInstructionCache
VirtualFree
VirtualQuery
FreeLibrary
GetModuleHandleW
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
LCMapStringW
GetStdHandle
GetFileType
GetACP
DeleteFileW
FindClose
FindFirstFileExA
user32
GetDesktopWindow
GetWindowThreadProcessId
LoadStringA
FindWindowA
MessageBoxA
RegisterWindowMessageA
SendMessageA
advapi32
OpenProcessToken
GetTokenInformation
dbghelp
MiniDumpWriteDump
ws2_32
ntohs
htons
WSAStartup
send
Exports
Exports
TDAGameGuard
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ