D:\GitHub\Exploits\Exploit-API\src\Release\exploit-main.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4e129586ca0e0ca240de511feec72343_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4e129586ca0e0ca240de511feec72343_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
4e129586ca0e0ca240de511feec72343_JaffaCakes118
-
Size
746KB
-
MD5
4e129586ca0e0ca240de511feec72343
-
SHA1
34f1b1710579cc8b904dd80bbc0d5063869721f9
-
SHA256
efab06726a49ca098a93544720d507539c9b45bc18e43dd2c0dffc5c9d11cd1d
-
SHA512
f319ffede28a8a6bc2cf76948ded508cd557cb4066fc555b827251a02821d2b4619779eab2c182ecd9004f584831c416f7b3478248c252a41b2e48fdbe256f74
-
SSDEEP
12288:ULqlm3IhGEi7/ox+q3hYZ4/zHjDF6TFW0D60fMJeu9btHyHO+w3Ms+AiigH:UGlm3IbijXYw4rdLi60waw3Ms+NVH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e129586ca0e0ca240de511feec72343_JaffaCakes118
Files
-
4e129586ca0e0ca240de511feec72343_JaffaCakes118.dll windows:6 windows x86 arch:x86
ab8b8d65dc650207b555d3d16e6947eb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
d3dcompiler_47
D3DCompile
d3d11
D3D11CreateDeviceAndSwapChain
kernel32
QueryPerformanceCounter
GetModuleFileNameA
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
FormatMessageA
ReadFile
VirtualProtect
GetConsoleScreenBufferInfo
CreateNamedPipeA
SetConsoleTextAttribute
VirtualFree
SetConsoleTitleA
GetCurrentProcess
GetStdHandle
VirtualAlloc
GetCurrentThreadId
GetCurrentDirectoryA
ExitThread
GetModuleHandleA
DisconnectNamedPipe
OpenProcess
MultiByteToWideChar
Sleep
CreateFileA
DisableThreadLibraryCalls
CloseHandle
FreeConsole
GetSystemInfo
CreateThread
AddVectoredExceptionHandler
ExitProcess
GetCurrentProcessId
GetConsoleWindow
AllocConsole
VirtualQuery
ConnectNamedPipe
InterlockedExchange
InterlockedCompareExchange
FlushInstructionCache
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
OpenThread
GetThreadContext
SetThreadContext
SuspendThread
ResumeThread
QueryPerformanceFrequency
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetThreadTimes
SetEndOfFile
WriteConsoleW
HeapSize
CreateFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetTimeZoneInformation
GetFileSizeEx
GetConsoleCP
WriteFile
FlushFileBuffers
EnumSystemLocalesW
GlobalUnlock
GlobalLock
GlobalFree
GetUserDefaultLCID
GlobalAlloc
GetModuleHandleW
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetFileType
ReadConsoleW
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
WideCharToMultiByte
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
GetProcessHeap
FormatMessageW
SwitchToThread
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlUnwind
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
GetModuleHandleExW
SetFilePointerEx
user32
EmptyClipboard
CloseClipboard
OpenClipboard
GetClipboardData
SetClipboardData
GetCursorPos
GetWindowThreadProcessId
GetSystemMenu
GetWindowRect
SetWindowPos
DeleteMenu
CreatePopupMenu
ShowWindow
GetAsyncKeyState
SetWindowLongA
CallWindowProcA
GetWindowLongA
MessageBoxA
SetMenu
DefWindowProcA
CreateWindowExA
FindWindowW
SendMessageA
mouse_event
DrawMenuBar
AppendMenuA
CreateMenu
SendInput
GetKeyState
LoadCursorA
ScreenToClient
GetCapture
ClientToScreen
IsChild
GetForegroundWindow
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
gdi32
GetStockObject
SetTextColor
shell32
ShellExecuteA
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
dbghelp
MiniDumpWriteDump
Sections
.text Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ