c:\Users\Chase\Desktop\O lawdy\black\Release\Black's.pdb
Static task
static1
Behavioral task
behavioral1
Sample
175005a8e18f93e3fe6483fc3d669894_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
175005a8e18f93e3fe6483fc3d669894_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
175005a8e18f93e3fe6483fc3d669894_JaffaCakes118
-
Size
292KB
-
MD5
175005a8e18f93e3fe6483fc3d669894
-
SHA1
e98322df1797cb8dfd1e4048d40bcd789ea405ad
-
SHA256
8490ff443c19130ccfc7ecedd62271e6b4045ddab47cc376d985355abd066fb9
-
SHA512
4ba795c953f59006f4cb11e1c1e86652b8dbf7b91aceaa3d9323de739b025a5b0ca3e082d03b416978b86854ce4249f0d60026dac56a5adb2f41cdcc25af9849
-
SSDEEP
3072:oLUCRZ4z8tvx5OrL6qCuXWMkamA/jXF6/QirbJWkrwWImh7DZJuuOmkP6gIAg0Fl:oLUqZcSOnTCklh6/Jn13ZgygIAOwXIM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 175005a8e18f93e3fe6483fc3d669894_JaffaCakes118
Files
-
175005a8e18f93e3fe6483fc3d669894_JaffaCakes118.dll windows:4 windows x86 arch:x86
b343086ea0f1737c27408d056c856e5e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
GetModuleHandleA
GetCurrentProcess
WriteProcessMemory
VirtualProtect
Sleep
CreateThread
GetTickCount
IsBadReadPtr
Module32Next
Module32First
CreateToolhelp32Snapshot
GetModuleFileNameA
ExitProcess
VirtualQuery
HeapAlloc
GetProcessHeap
FreeLibrary
FlushInstructionCache
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualAlloc
ReadFile
SetEndOfFile
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TerminateProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
CloseHandle
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetTimeZoneInformation
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
InterlockedExchange
GetACP
GetOEMCP
GetCPInfo
SetUnhandledExceptionFilter
IsBadWritePtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CreateFileA
InitializeCriticalSection
SetFilePointer
RaiseException
LoadLibraryA
LCMapStringA
MultiByteToWideChar
LCMapStringW
QueryPerformanceCounter
GetCurrentProcessId
user32
GetAsyncKeyState
vstdlib
RandomFloat
RandomSeed
Q_strncpy
Q_snprintf
KeyValuesSystem
Q_strnicmp
tier0
Msg
?GetSubNode@CVProfNode@@QAEPAV1@PBDH0H@Z
?EnterScope@CVProfNode@@QAEXXZ
?ExitScope@CVProfNode@@QAE_NXZ
Error
g_pMemAlloc
GetCPUInformation
g_VProfCurrentProfile
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ