C:\Projects\Diablo2\trunk\Diablo2\Builder\PDB\D2DDraw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0e811f2281cf586d493586599f2c0a14_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e811f2281cf586d493586599f2c0a14_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0e811f2281cf586d493586599f2c0a14_JaffaCakes118
-
Size
248KB
-
MD5
0e811f2281cf586d493586599f2c0a14
-
SHA1
e6c3aae1bcd330d46e0c59238f9ff32a4edd32c7
-
SHA256
66a89392f468fbff8f84674321a5e5cf779a202180bf4135ea9495541a288eda
-
SHA512
9ecc5d8fa0ebe85b88a12b16a21bc19fb8faffa517fb90aae3bc833d705828fa3422cd8ca6931f4df8b23bf47573d65a3d75ea10f2feef64dce90db8d25fba30
-
SSDEEP
6144:SdsYs0YJ0bHT4ywe8Y0HP7caK9XjZGPzrti2jmEwI13o8GWY56xkZe:PYsRJPVexGDK9XjZMzJi2iE7S8G5KkZe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e811f2281cf586d493586599f2c0a14_JaffaCakes118
Files
-
0e811f2281cf586d493586599f2c0a14_JaffaCakes118.dll windows:4 windows x86 arch:x86
8e9fd13319552db19bfad85d9eea1eb8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualFree
UnhandledExceptionFilter
WriteFile
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
GetLocaleInfoA
HeapFree
GetStringTypeA
HeapCreate
GetStringTypeW
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualProtect
GetSystemInfo
TlsGetValue
TlsSetValue
TlsFree
GetLastError
SetLastError
TlsAlloc
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
MultiByteToWideChar
SetHandleCount
HeapSize
HeapAlloc
HeapReAlloc
GetVersionExA
GetCommandLineA
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
GetModuleHandleA
GetProcAddress
ExitProcess
CloseHandle
Sleep
GetTickCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
user32
wvsprintfA
TranslateMessage
PeekMessageA
DispatchMessageA
SetRect
DrawTextA
gdi32
DeleteDC
CreateFontA
SetBkColor
CreateDCA
CreateBitmap
SetBkMode
DeleteObject
SelectObject
GetCharWidthA
GetPixel
SetTextColor
ddraw
DirectDrawCreate
storm
ord268
ord281
ord321
ord423
ord421
ord422
ord403
fog
ord10198
ord10117
ord10022
gdwBitMasks
ord10042
ord10024
ord10043
ord10265
ord10029
d2sound
ord10005
d2cmp
ord10067
ord10096
ord10025
ord10053
ord10093
ord10079
ord10043
ord10031
ord10020
ord10008
ord10026
smackw32
_SmackClose@4
_SmackToBuffer@28
_SmackDoFrame@4
_SmackOpen@12
_SmackNextFrame@4
_SmackWait@4
binkw32
_BinkOpenDirectSound@4
_BinkCopyToBuffer@28
_BinkNextFrame@4
_BinkWait@4
_BinkDoFrame@4
_BinkSetSoundSystem@8
_BinkClose@4
_BinkDDSurfaceType@4
_BinkOpen@8
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE