C:\Users\NOOB\Desktop\Menu Code64 5.0\Release\Code64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0924563a0610954b042e0ba73c1c7f60_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0924563a0610954b042e0ba73c1c7f60_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
0924563a0610954b042e0ba73c1c7f60_JaffaCakes118
-
Size
167KB
-
MD5
0924563a0610954b042e0ba73c1c7f60
-
SHA1
a040c2cc0d8b2a425e4dd4b62c5b487981d6b4a7
-
SHA256
e7c1d772e5c50bde54c1b6cff884553731c560e14ef2737e10b0982bc99e3779
-
SHA512
cd3c0e43b3b621913b5aab5e243f79d1567a5e64b975fb60cd956f8c9e247b3a3b529472b5b3c93655e9c0032baa32d709ff8ae4add6ed89a01b807a9d9db519
-
SSDEEP
3072:ylsaejrym11Xgy19aZrYro2IHwNG/mT5tIuOZvzhgZoSraa0ymMu0Q41M:Eejrym11XXorYMpa9tJOZvzhg0ymME41
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0924563a0610954b042e0ba73c1c7f60_JaffaCakes118
Files
-
0924563a0610954b042e0ba73c1c7f60_JaffaCakes118.dll windows:5 windows x86 arch:x86
12acb00768a6338efa58dd3f8a1bcfcb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetVolumeInformationA
GetModuleFileNameA
IsBadReadPtr
GetModuleHandleA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetSystemTimeAsFileTime
GetWindowsDirectoryA
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
CreateThread
DisableThreadLibraryCalls
Sleep
GetCurrentProcessId
VirtualProtect
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
IsProcessorFeaturePresent
user32
GetAsyncKeyState
SetRect
mouse_event
GetSystemMetrics
keybd_event
wsprintfA
GetActiveWindow
GetCursorPos
GetDesktopWindow
advapi32
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptGetHashParam
msvcp100
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Decref@facet@locale@std@@QAEPAV123@XZ
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
?_Xlength_error@std@@YAXPBD@Z
?_BADOFF@std@@3_JB
?always_noconv@codecvt_base@std@@QBE_NXZ
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?_Incref@facet@locale@std@@QAEXXZ
??Bid@locale@std@@QAEIXZ
?id@?$codecvt@DDH@std@@2V0locale@2@A
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?_Getcat@?$codecvt@DDH@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?unshift@?$codecvt@DDH@std@@QBEHAAHPAD1AAPAD@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
?out@?$codecvt@DDH@std@@QBEHAAHPBD1AAPBDPAD3AAPAD@Z
?in@?$codecvt@DDH@std@@QBEHAAHPBD1AAPBDPAD3AAPAD@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
d3d9
Direct3DCreate9
d3dx9_43
D3DXCreateLine
D3DXCreateFontA
D3DXMatrixTransformation2D
D3DXVec3Project
D3DXCreateTextureFromFileInMemory
D3DXCreateSprite
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcr100
_CIsin
_CIsqrt
memset
memcpy
_CxxThrowException
_CIcos
_CIatan2
__clean_type_info_names_internal
?_type_info_dtor_internal_method@type_info@@QAEXXZ
malloc
system
??0exception@std@@QAE@ABV01@@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??3@YAXPAX@Z
_lock_file
_unlock_file
fputc
??2@YAPAXI@Z
fwrite
ungetc
fgetc
memmove
memcpy_s
_fseeki64
fgetpos
fsetpos
setvbuf
fflush
fclose
??0bad_cast@std@@QAE@ABV01@@Z
??1bad_cast@std@@UAE@XZ
??0bad_cast@std@@QAE@PBD@Z
vsprintf_s
rand
sprintf
clock
mbstowcs_s
__CxxFrameHandler3
_unlock
__dllonexit
_lock
_onexit
_malloc_crt
free
_encoded_null
_initterm
_initterm_e
_amsg_exit
__CppXcptFilter
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
Sections
_TEXT Size: 512B - Virtual size: 431B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ