E:\GitHub\Exploits\Exploit-API\Release\exploit-main.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2e8fa039e453546c804a7e912d2fdabe_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2e8fa039e453546c804a7e912d2fdabe_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
2e8fa039e453546c804a7e912d2fdabe_JaffaCakes118
-
Size
746KB
-
MD5
2e8fa039e453546c804a7e912d2fdabe
-
SHA1
dd809fa74a982483c430aa500944d12732c8886b
-
SHA256
175b877094e87c277b79612ada1fec0448cf5e522be4ed58bdd36f34d3e93ac3
-
SHA512
637a2479e386ef72d030cd445481c7cfb5b7d035f2759eaf99a8af34d97c39bbed6af278c4627c92022e3d8f343890e2388a01486f50522234923e4dd0938cbe
-
SSDEEP
12288:+JRg7jmc3oxBrF6nV2H8goQN/J6LlO2XLMfSKhsnJFBruFY+snt0MUer3lXGgEF:2Rg7Bq62tb9bXfSKeM2r3l2gEF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e8fa039e453546c804a7e912d2fdabe_JaffaCakes118
Files
-
2e8fa039e453546c804a7e912d2fdabe_JaffaCakes118.dll windows:6 windows x86 arch:x86
918a5adae22d9acc7df1b789ce833b18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
d3dcompiler_47
D3DCompile
d3d11
D3D11CreateDeviceAndSwapChain
kernel32
QueryPerformanceCounter
GetModuleFileNameA
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
FormatMessageA
ReadFile
VirtualProtect
GetConsoleScreenBufferInfo
CreateNamedPipeA
SetConsoleTextAttribute
VirtualFree
SetConsoleTitleA
GetCurrentProcess
GetStdHandle
VirtualAlloc
GetCurrentThreadId
GetCurrentDirectoryA
ExitThread
GetModuleHandleA
DisconnectNamedPipe
OpenProcess
Sleep
CreateFileA
DisableThreadLibraryCalls
CloseHandle
FreeConsole
GetSystemInfo
CreateThread
AddVectoredExceptionHandler
ExitProcess
GetCurrentProcessId
GetConsoleWindow
IsBadReadPtr
AllocConsole
VirtualQuery
ConnectNamedPipe
InterlockedExchange
InterlockedCompareExchange
FlushInstructionCache
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
OpenThread
GetThreadContext
SetThreadContext
SuspendThread
ResumeThread
GetModuleHandleW
QueryPerformanceFrequency
Thread32First
Thread32Next
HeapSize
CreateFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetTimeZoneInformation
GetFileSizeEx
GetConsoleCP
WriteFile
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetModuleHandleExW
LoadLibraryExW
GetModuleFileNameW
InterlockedFlushSList
RtlUnwind
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GlobalUnlock
GlobalLock
GlobalFree
TlsFree
TlsSetValue
GlobalAlloc
WriteConsoleW
SetEndOfFile
CreateToolhelp32Snapshot
TlsGetValue
TlsAlloc
SwitchToThread
SetLastError
FormatMessageW
GetProcessHeap
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoW
GetSystemTimeAsFileTime
user32
EmptyClipboard
CloseClipboard
OpenClipboard
GetClipboardData
SetClipboardData
SendMessageA
GetCursorPos
GetWindowThreadProcessId
GetSystemMenu
GetWindowRect
SetWindowPos
DeleteMenu
CreatePopupMenu
GetAsyncKeyState
SetWindowLongA
CallWindowProcA
GetWindowLongA
MessageBoxA
SetMenu
DefWindowProcA
CreateWindowExA
FindWindowW
ShowWindow
mouse_event
DrawMenuBar
AppendMenuA
CreateMenu
SendInput
GetKeyState
LoadCursorA
ScreenToClient
GetCapture
ClientToScreen
IsChild
GetForegroundWindow
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
gdi32
GetStockObject
SetTextColor
shell32
ShellExecuteA
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
dbghelp
MiniDumpWriteDump
Sections
.text Size: 577KB - Virtual size: 577KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ