o.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14ae1285d493159a526eac7bb5eacfff_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14ae1285d493159a526eac7bb5eacfff_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
14ae1285d493159a526eac7bb5eacfff_JaffaCakes118
-
Size
556KB
-
MD5
14ae1285d493159a526eac7bb5eacfff
-
SHA1
adaf00859f074dccbfba43726410e29dc7cc40c1
-
SHA256
6a87afed1e2b556034873f6d037508e2c55023128e8bae828f91c71115f57db8
-
SHA512
be574f4160b0c4ea0dddbd3bda79f80e8995247cab75de2805c5b1ba0d84d7a0183d2181ef55ca0979cc90d86baa4473eff8d452b11d9ef28b81afa1f8c9566c
-
SSDEEP
6144:MytbH9y8RtSUVT+8id0zvvkbxZEZuJFqhmVaFQqtHCCKZuYN:Ht9RtpVud+vOxpJ4p7RNKZZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14ae1285d493159a526eac7bb5eacfff_JaffaCakes118
Files
-
14ae1285d493159a526eac7bb5eacfff_JaffaCakes118.dll windows:4 windows x86 arch:x86
8a9988add86692ffe91976134ca44c68
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
TlsGetValue
lstrcmpA
GetCurrentThreadId
DeleteCriticalSection
GetCurrentProcessId
DisableThreadLibraryCalls
FreeEnvironmentStringsW
GetStdHandle
TlsFree
GetOEMCP
QueryPerformanceCounter
WideCharToMultiByte
LocalAlloc
LCMapStringA
VirtualFree
InterlockedIncrement
MapViewOfFile
LoadLibraryA
HeapReAlloc
GetDiskFreeSpaceA
VirtualProtect
GetFileType
CreateFileMappingW
EnterCriticalSection
CreateMutexW
UnmapViewOfFile
DeleteFileA
InterlockedExchange
GetSystemInfo
SetHandleCount
GetProcAddress
GetTickCount
DeleteFileW
GetVersionExA
CloseHandle
SetFilePointer
SetFileTime
TlsAlloc
IsDBCSLeadByte
WaitForSingleObject
Sleep
GetFullPathNameW
ReleaseMutex
SetLastError
CreateFileW
CompareFileTime
GetLocaleInfoA
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CreateThread
HeapFree
GetDiskFreeSpaceW
HeapDestroy
InterlockedDecrement
GetCPInfo
HeapCreate
GetSystemTimeAsFileTime
SetEndOfFile
CreateFileMappingA
WriteFile
CreateMutexA
FreeEnvironmentStringsA
TerminateProcess
GetStringTypeExA
GetCurrentProcess
UnhandledExceptionFilter
GetLastError
VirtualAlloc
MoveFileA
MoveFileW
FlushViewOfFile
GetACP
SetUnhandledExceptionFilter
FreeLibrary
lstrlenW
GetEnvironmentStrings
HeapAlloc
lstrlenA
GetEnvironmentVariableA
OpenFileMappingA
InitializeCriticalSection
lstrcmpiA
LeaveCriticalSection
CreateEventA
VirtualQuery
GetStringTypeW
GetFullPathNameA
CreateFileA
GetEnvironmentStringsW
GetFileSize
GetStringTypeA
GetStartupInfoA
LocalFree
OpenFileMappingW
IsBadReadPtr
SetEvent
msvcrt
memcpy
Exports
Exports
lozcnm
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 460KB - Virtual size: 458KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ