d:\Works\ByShell_Up47\DarkShell\Release\DarkShell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0e42d46097f38fc877cedd3f654f411f_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e42d46097f38fc877cedd3f654f411f_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
0e42d46097f38fc877cedd3f654f411f_JaffaCakes118
-
Size
132KB
-
MD5
0e42d46097f38fc877cedd3f654f411f
-
SHA1
0b917d9d92438ee5c7927f11868091419d4d2ce2
-
SHA256
7f8ce58a69ea86a1bb74dcdc7ae72a4acb70f060950b0f0f01acbc7b94a22629
-
SHA512
de3e048eb0e06ceb6e9091d8d1044835ad053ebbd2001d5f8981eac37b7073e899fd5453e8f629c87188d54b7cfab1d7c3ad75469facb87ad4800a377b1b0a0e
-
SSDEEP
1536:B1R4pNTA9yYejzwMxFaP3yKNy6ZzHzibN7MJ4gkIkQZwbUhxxHFyom1eQli1CUfr:B1R4qej8MxFaJZQSvq3bSHAom1eQl+j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e42d46097f38fc877cedd3f654f411f_JaffaCakes118
Files
-
0e42d46097f38fc877cedd3f654f411f_JaffaCakes118.dll windows:4 windows x86 arch:x86
507a99d2a365a756a2e0d1031a0b9493
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateEventW
GetModuleHandleW
VirtualFreeEx
ReadProcessMemory
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetProcAddress
OpenProcess
FreeLibrary
LoadLibraryW
GetModuleFileNameA
ResumeThread
CreateProcessW
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableW
GetShortPathNameW
GetModuleFileNameW
GetPrivateProfileStringW
OpenFile
ExitProcess
DeleteFileA
GetCurrentThreadId
WriteFile
PeekNamedPipe
GetStartupInfoW
CreatePipe
GetTempPathW
GetWindowsDirectoryW
SetEvent
GlobalMemoryStatus
TerminateProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MultiByteToWideChar
lstrlenA
GetExitCodeThread
VirtualFree
GetComputerNameW
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
CreateFileW
GetStringTypeW
GetStringTypeA
FindFirstFileW
FlushFileBuffers
SetStdHandle
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetCPInfo
GetOEMCP
LoadLibraryA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
HeapSize
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
HeapCreate
HeapDestroy
GetModuleHandleA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
VirtualQuery
GetFileSize
CloseHandle
GetVolumeInformationW
TerminateThread
lstrlenW
WideCharToMultiByte
Sleep
GetLastError
CreateThread
lstrcpyW
GetTickCount
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapReAlloc
GetCommandLineA
HeapAlloc
HeapFree
RtlUnwind
FindNextFileW
FindClose
GetDriveTypeW
GetDiskFreeSpaceExW
CreateDirectoryW
MoveFileA
GetSystemDirectoryW
lstrcatW
DeleteFileW
CopyFileW
CreateProcessA
ReadFile
GetACP
SetEndOfFile
InterlockedExchange
user32
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
RegisterClassW
LoadCursorW
KillTimer
GetAsyncKeyState
SetTimer
DefWindowProcW
IsWindow
SendMessageW
GetDesktopWindow
GetKeyState
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongW
EnumChildWindows
mouse_event
SetCursorPos
keybd_event
LoadIconW
GetSystemMetrics
GetWindowTextA
ReleaseDC
FindWindowExW
GetWindowTextW
ExitWindowsEx
wsprintfW
FindWindowW
CloseWindowStation
OpenInputDesktop
GetUserObjectInformationW
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationW
SetProcessWindowStation
OpenDesktopW
SetThreadDesktop
PostMessageW
RegisterWindowMessageW
SendMessageTimeoutW
GetClassNameW
GetCursor
IsRectEmpty
GetDC
advapi32
RegOpenKeyExW
DeleteService
ImpersonateSelf
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExW
RegDeleteKeyW
RegSetValueExW
RegCloseKey
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceStatus
ControlService
ole32
CoInitialize
shell32
SHFileOperationW
ShellExecuteA
oleaut32
VariantClear
VariantInit
SysFreeString
ws2_32
htonl
WSACleanup
ntohl
ntohs
select
getpeername
send
recv
htons
WSAStartup
inet_ntoa
gethostbyname
closesocket
sendto
socket
inet_addr
setsockopt
connect
avicap32
capCreateCaptureWindowW
capGetDriverDescriptionW
gdi32
GetStockObject
GetDIBits
RealizePalette
SelectPalette
GetObjectW
GetDeviceCaps
CreateCompatibleBitmap
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
DeleteObject
psapi
GetModuleFileNameExW
EnumProcessModules
wininet
InternetCloseHandle
InternetOpenW
InternetOpenUrlW
InternetReadFile
Exports
Exports
DownCtrlAltDel
GetDllModuleControl
StartServer
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.BYShell Size: 4KB - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ