o.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1ec3c2a646bb021924bbd2fe3a9b350f_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1ec3c2a646bb021924bbd2fe3a9b350f_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
1ec3c2a646bb021924bbd2fe3a9b350f_JaffaCakes118
-
Size
72KB
-
MD5
1ec3c2a646bb021924bbd2fe3a9b350f
-
SHA1
0a8e6d040e01ac7d3bd461157c87546abcfea8a4
-
SHA256
bc83bf7b8724fe2a80fbd8a1783c32a24a31e9338dc5aa742515095d7e91e8d3
-
SHA512
016ccc38b80abf227262e56431c170840be76e46a3dff44c055ec818b373f6e1f5fbea19bc65aa78c002be6882a578f621a361cc5afa4343d6e30a7031f85fed
-
SSDEEP
1536:nvM1odYeEAcjPDUO66uOms/dMnVr458i:vQodY8cjPDUwx/dMVr45d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1ec3c2a646bb021924bbd2fe3a9b350f_JaffaCakes118
Files
-
1ec3c2a646bb021924bbd2fe3a9b350f_JaffaCakes118.dll windows:4 windows x86 arch:x86
3aa9d5de0ca000ef4d056074cf34489b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCPInfo
CreateFileMappingA
GetEnvironmentVariableA
FreeEnvironmentStringsW
VirtualFree
LocalAlloc
GetDiskFreeSpaceA
SetFileTime
CreateThread
DeleteFileW
LeaveCriticalSection
UnmapViewOfFile
InitializeCriticalSection
FlushViewOfFile
HeapDestroy
FreeLibrary
GetStdHandle
GetEnvironmentStrings
InterlockedDecrement
TlsGetValue
InterlockedExchange
SetHandleCount
GetStringTypeW
GetSystemInfo
GetTickCount
HeapReAlloc
CreateMutexA
SetLastError
VirtualAlloc
lstrlenW
DeleteFileA
GetFileSize
GetDiskFreeSpaceW
FreeEnvironmentStringsA
lstrcmpiA
GetACP
VirtualQuery
SetEndOfFile
CreateMutexW
GetCurrentProcessId
CreateFileW
TerminateProcess
IsBadReadPtr
IsDBCSLeadByte
GetFileType
GetLastError
MultiByteToWideChar
CreateEventA
GetCurrentProcess
DisableThreadLibraryCalls
TlsAlloc
CreateFileA
GetStringTypeExA
Sleep
QueryPerformanceCounter
OpenFileMappingA
InitializeCriticalSectionAndSpinCount
MapViewOfFile
GetEnvironmentStringsW
GetOEMCP
EnterCriticalSection
CompareFileTime
VirtualProtect
WriteFile
lstrlenA
GetFullPathNameW
WideCharToMultiByte
WaitForSingleObject
MoveFileW
OpenFileMappingW
GetVersionExA
SetUnhandledExceptionFilter
GetProcAddress
DeleteCriticalSection
GetCurrentThreadId
HeapAlloc
lstrcmpA
UnhandledExceptionFilter
GetFullPathNameA
TlsFree
MoveFileA
HeapFree
GetStartupInfoA
GetStringTypeA
ReleaseMutex
InterlockedIncrement
CreateFileMappingW
GetSystemTimeAsFileTime
SetFilePointer
LoadLibraryA
LocalFree
HeapCreate
LCMapStringA
CloseHandle
GetLocaleInfoA
SetEvent
SetEnvironmentVariableA
Exports
Exports
bxahr
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ