c:\src\RkVerify - International\Confidence\InstallMonitor\Release\InstallMonitor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3116fc8488cc048eca9c9e0ac2167655_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3116fc8488cc048eca9c9e0ac2167655_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3116fc8488cc048eca9c9e0ac2167655_JaffaCakes118
-
Size
157KB
-
MD5
3116fc8488cc048eca9c9e0ac2167655
-
SHA1
b4f1daf2326a67bbd41463b3bb02a47a3c6e4aad
-
SHA256
c4bc98e679d8f54e234ec5697ee566dc49e1178b3926e21a102dbbe9de346a5a
-
SHA512
9f6e8b166f64bdb87c072a7b4914beebfba3ce3ddf47120d2e1c7246d4588975c233ca3edf7c9db0dbb6a19c6b14f67a8cec9b205730412a8ab942fc1f35d613
-
SSDEEP
3072:crLKtX1P5YXZYYN5XNdvZlFk70zJjxWRUyaG7IJeilZajufWpoXCFHJ9kNAy:eK5YJYYN5XNdv1o09RyZGF9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3116fc8488cc048eca9c9e0ac2167655_JaffaCakes118
Files
-
3116fc8488cc048eca9c9e0ac2167655_JaffaCakes118.dll windows:4 windows x86 arch:x86
1b5fc5b9719e3e9414ef442c46bc9cea
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
lstrlenA
GetCurrentThread
GetModuleFileNameA
GetCurrentProcessId
LoadLibraryA
GetACP
VirtualAlloc
VirtualQuery
InterlockedCompareExchange
GetCurrentThreadId
ResumeThread
VirtualProtect
FlushInstructionCache
GetCurrentProcess
GetThreadContext
SetThreadContext
SuspendThread
FreeLibrary
GetProcAddress
SetLastError
GetModuleHandleA
InterlockedExchange
GetTickCount
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetLocaleInfoW
IsBadCodePtr
IsBadReadPtr
IsValidCodePage
IsValidLocale
CloseHandle
UnmapViewOfFile
GetComputerNameA
MapViewOfFile
CreateFileMappingA
Process32Next
Process32First
CreateToolhelp32Snapshot
WriteFile
SetFilePointer
CreateFileA
GetLocalTime
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
LocalFree
LocalAlloc
WideCharToMultiByte
ExitProcess
RtlUnwind
HeapFree
HeapAlloc
GetCommandLineA
GetTimeFormatA
GetDateFormatA
LCMapStringA
LCMapStringW
GetCPInfo
HeapReAlloc
QueryPerformanceCounter
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
TerminateProcess
HeapSize
GetSystemInfo
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
user32
GetWindowLongA
EnumChildWindows
GetClientRect
GetWindowTextA
GetClassNameA
GetWindowTextW
SendMessageA
CallNextHookEx
GetParent
GetWindowInfo
WindowFromDC
advapi32
InitializeAcl
SetSecurityInfo
RegSetValueExA
RegOpenKeyExA
RegCloseKey
Exports
Exports
KeyboardProc
MouseProc
MsgProc
ShellProc
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ