E:\Programacion\Game Hacking\WolfTeam\12-01-06\WTS Trainer\cxW01\Release\cxW01.pdb
Behavioral task
behavioral1
Sample
0a0f6ae3cf204a10add429b4fe9ea7df_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a0f6ae3cf204a10add429b4fe9ea7df_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0a0f6ae3cf204a10add429b4fe9ea7df_JaffaCakes118
-
Size
893KB
-
MD5
0a0f6ae3cf204a10add429b4fe9ea7df
-
SHA1
07492e04d723a9703b22808408466d049fd58230
-
SHA256
ce3232fb3845a38ddf5b72ab4c04d9ddbf1b87bc7e083f6b6196ec6e335e05f9
-
SHA512
5f4703174849cbd8a3245f9dad6f76cc4871617baf05dad74b9638aeb210ce6b7d895bd6a07a8ad98e90e6836d0b8862d8b8b195afba09d638ca293ea42c70fe
-
SSDEEP
3072:qmUhS0vQlCQrwqDagznCxeiEXa48oDn1:qmUjQl1DxznCMRK1oDn1
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a0f6ae3cf204a10add429b4fe9ea7df_JaffaCakes118
Files
-
0a0f6ae3cf204a10add429b4fe9ea7df_JaffaCakes118.dll windows:5 windows x86 arch:x86
bfd9c168705cb5d9ae193ed8725803e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
Sleep
DisableThreadLibraryCalls
CreateThread
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
user32
GetAsyncKeyState
GetMessageA
SetTimer
GetDlgItem
IsDlgButtonChecked
DispatchMessageA
EnableWindow
DialogBoxParamA
msvcr100
_amsg_exit
__CppXcptFilter
_crt_debugger_hook
_initterm_e
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_initterm
_encoded_null
free
_malloc_crt
__clean_type_info_names_internal
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 868KB - Virtual size: 868KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ