C:\Iñaki\Cabal Online Hack\Release\Cabal Online VIP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4f498143da0cda6cddd9af2238242ba1_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4f498143da0cda6cddd9af2238242ba1_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
4f498143da0cda6cddd9af2238242ba1_JaffaCakes118
-
Size
188KB
-
MD5
4f498143da0cda6cddd9af2238242ba1
-
SHA1
f0ca1fc8f9ee67c7ba9331c53e17c38aa3d9bd24
-
SHA256
b55662dd47a4cdbfbe3ffa5f5996cda37da63ca6aa6fdecc55224157ba1eb477
-
SHA512
4966b385899f80c5d98a5010fea22086d041b551b15ee28d32d442881208d2145ad1788259b0e503f6b9f1cbce1ce6568b91769732fb8b75f5e101cd9f22150b
-
SSDEEP
3072:yOpqrAaQGdTaPKWjBR2PV9uw4pX+/YSRN8YsaQC72oF:IrA7DjBR2TsoYk8YsaZ72oF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f498143da0cda6cddd9af2238242ba1_JaffaCakes118
Files
-
4f498143da0cda6cddd9af2238242ba1_JaffaCakes118.dll windows:6 windows x86 arch:x86
112dde4555f880d85069ccb446e129e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ExitProcess
GetCurrentProcess
GetVolumeInformationA
Sleep
K32GetModuleInformation
GetModuleHandleA
VirtualProtect
CloseHandle
GetProcAddress
ReadProcessMemory
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
Beep
user32
GetWindowThreadProcessId
GetAsyncKeyState
GetForegroundWindow
GetCursorPos
EnumWindows
SetWindowPos
SetForegroundWindow
ShowWindow
FindWindowA
keybd_event
MapVirtualKeyA
mouse_event
MessageBoxA
msvcp120
?_Winerror_map@std@@YAPBDH@Z
?_Xbad_alloc@std@@YAXXZ
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Syserror_map@std@@YAPBDH@Z
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
msvcr120
rand
srand
??3@YAXPAX@Z
_cexit
??2@YAPAXI@Z
??1type_info@@UAE@XZ
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
_beginthread
__crtUnhandledException
__crtTerminateProcess
__CppXcptFilter
_amsg_exit
free
_malloc_crt
_initterm
_initterm_e
?terminate@@YAXXZ
_except_handler4_common
__clean_type_info_names_internal
__FrameUnwindFilter
system
memmove
_purecall
_crt_debugger_hook
??_V@YAXPAX@Z
__CxxFrameHandler3
memcpy
_time64
_CxxThrowException
mscoree
_CorDllMain
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 778KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ