D:\service\MyServiceDll\Release\MyServiceDll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
23056ddea8ca4eda0e4f7fd0a84f6cc3_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23056ddea8ca4eda0e4f7fd0a84f6cc3_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
23056ddea8ca4eda0e4f7fd0a84f6cc3_JaffaCakes118
-
Size
1.2MB
-
MD5
23056ddea8ca4eda0e4f7fd0a84f6cc3
-
SHA1
22cd6947f1d1ef60155ca2869c212344621fb161
-
SHA256
04f2fee1584b9b0a5783dd1bfc4dd08f08cb445383e6a4b69faf08c37ae75689
-
SHA512
4f33c7802080cb97ee62d10aa308a4b88e3fc13eae22eec6bce8e04b3d2f31f3df35f795e5378509b2f7cc85c55cbb98e7932a33b251a0c0f98084ba490d80a2
-
SSDEEP
24576:ILiRb1g2y1Jt8N+9MG68ypABMvnH1HEFgM5gvAhl9ddkqDMFPzH:EiNy1JR9MG68mAB8CFgM5gvAhnkegPzH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23056ddea8ca4eda0e4f7fd0a84f6cc3_JaffaCakes118
Files
-
23056ddea8ca4eda0e4f7fd0a84f6cc3_JaffaCakes118.dll windows:6 windows x86 arch:x86
3140c520b14573b58f1673529240a8df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateThread
CreateRemoteThread
TerminateThread
OpenProcess
GetTickCount
GetWindowsDirectoryA
VirtualAlloc
VirtualProtect
VirtualFree
VirtualAllocEx
WriteProcessMemory
GetCurrentProcess
GetModuleFileNameA
GetProcAddress
LoadLibraryA
lstrlenA
CopyFileA
IsBadReadPtr
CreateFileW
ReadConsoleW
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
Sleep
CreateEventA
SetEvent
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
DuplicateHandle
CloseHandle
DecodePointer
OutputDebugStringA
WriteFile
SetFilePointer
SetFileAttributesA
DeleteFileA
CreateFileA
FreeLibrary
CreateDirectoryA
SetStdHandle
WriteConsoleW
SetFilePointerEx
GetFileSizeEx
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetCurrentThread
GetStdHandle
GetFileType
MultiByteToWideChar
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileAttributesExW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetConsoleCtrlHandler
GetStringTypeW
user32
GetMessageA
UnregisterClassA
DispatchMessageA
TranslateMessage
advapi32
UnlockServiceDatabase
StartServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
OpenServiceA
OpenSCManagerA
LockServiceDatabase
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
RegSetValueExA
RegSaveKeyA
RegRestoreKeyA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
LookupPrivilegeValueA
SetTokenInformation
DuplicateTokenEx
AdjustTokenPrivileges
CreateProcessAsUserA
OpenProcessToken
shell32
SHGetSpecialFolderPathA
wtsapi32
WTSQueryUserToken
Exports
Exports
MyDllexport
Sections
.text Size: 266KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 911KB - Virtual size: 916KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ