G:\projects\G\CQXZS\org\传奇DPK\bin\DPK.pdb
Behavioral task
behavioral1
Sample
8e780048701019bf5511ca2f4b58f53e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e780048701019bf5511ca2f4b58f53e_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
8e780048701019bf5511ca2f4b58f53e_JaffaCakes118
-
Size
1.4MB
-
MD5
8e780048701019bf5511ca2f4b58f53e
-
SHA1
003066429b194dcd774e8245cd9617064a181d00
-
SHA256
fb88d458d114015515829cffae2f7b8b9e9e3429f1dd969dbe0eb1e88d966d3a
-
SHA512
485f7cb8bc89484fe57116c17117e38df6d271c0df097a2521ddb1bd136d0c46a51a90e252cef7c49b88d07bcc3ced61a8f39f05b4339d79fb7f232ce8affa9c
-
SSDEEP
24576:Yu8WY4K5ntZEYDxQxdg9vw1+DyXswtc+mFTA0DQkIXWsI4pcue/AoNoV:d8WY4At7xQnghw8uXXtc+O7Dqm74p1
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e780048701019bf5511ca2f4b58f53e_JaffaCakes118
Files
-
8e780048701019bf5511ca2f4b58f53e_JaffaCakes118.dll windows:5 windows x86 arch:x86
737b74a4204941101306ee4e23d8d2d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetStdHandle
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
SetCaretPos
gdi32
SetWindowOrgEx
shell32
DragFinish
winmm
PlaySoundA
ole32
CLSIDFromString
comctl32
_TrackMouseEvent
riched20
ord4
Sections
.text Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HookShar Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 683KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ