F:\muma\110811110908过KAV6(在用)\Release\ServiceDll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
29713eeec1c6f2902ab640a30ac8e6c6_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29713eeec1c6f2902ab640a30ac8e6c6_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
29713eeec1c6f2902ab640a30ac8e6c6_JaffaCakes118
-
Size
69KB
-
MD5
29713eeec1c6f2902ab640a30ac8e6c6
-
SHA1
5b4f48abfbcb31e2e3d360d5983f61864365f475
-
SHA256
3db7b44f72e0ec2f458b7ad7a4b8d6b7d42630c9cc71cff6b74b2a87e22e3a84
-
SHA512
a9f47b68b3a0cf91f453adf6b55968d348d6dc9bad2f7524b870ec83aa7eb122c4438a9dc91e3de7eaaf2158a01b8fb2bf37f487b55db5c5b7ba86ea140118f5
-
SSDEEP
1536:22E5jH9mheIthDaJhzddk48+ZkcIkdm5C:xE5QVTOZdm1kdm5C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29713eeec1c6f2902ab640a30ac8e6c6_JaffaCakes118
Files
-
29713eeec1c6f2902ab640a30ac8e6c6_JaffaCakes118.dll windows:5 windows x86 arch:x86
ee0c66ee507804fdc5807dd941763502
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateFileA
lstrcatA
WriteFile
Sleep
SetFileTime
GetFileTime
GetSystemDirectoryA
SetFileAttributesA
CreateDirectoryA
FindClose
FindNextFileA
CreateProcessA
FindFirstFileA
lstrlenA
GetFileSize
WaitForSingleObject
GetDriveTypeA
GetLogicalDrives
WinExec
TerminateThread
MoveFileA
WaitForMultipleObjects
GetModuleFileNameA
lstrcpyA
GetLastError
CreateMutexA
SetEvent
CreateEventA
SetFilePointer
ReadFile
LoadLibraryA
GetProcAddress
GetVersionExA
GetACP
GetLocaleInfoA
GetCurrentProcess
DeleteFileA
CloseHandle
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
HeapDestroy
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
ExitProcess
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapSize
FlushFileBuffers
advapi32
RegQueryValueExA
RegDeleteValueA
RegCloseKey
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
Exports
Exports
ServiceMain
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ