c:\Users\Marco\Desktop\SUPERSEXY'S PUBLIC HOOK!!\Debug\Menu Fix 1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3143f1fb407eab2314315f92626b379b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3143f1fb407eab2314315f92626b379b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3143f1fb407eab2314315f92626b379b_JaffaCakes118
-
Size
500KB
-
MD5
3143f1fb407eab2314315f92626b379b
-
SHA1
77ae8f71530a23ccb78f68934e7147ed6da736d6
-
SHA256
4367c00272f246e45d110157082fc1dba00f59650e9a2e3838c9722e1f3c0912
-
SHA512
662057da2848fb6c109b5a9e9780778a8b9400c12391aabebb29b179e22f6b90c2abd026e0e7cfccec10be090ea3801f255a97ae75287db9c3e95c3d29164849
-
SSDEEP
12288:fOPy0GuszR3aSGj3mMiByzvBZtkrjg5V/MrT:GPNMR3S3RnkS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3143f1fb407eab2314315f92626b379b_JaffaCakes118
Files
-
3143f1fb407eab2314315f92626b379b_JaffaCakes118.dll windows:5 windows x86 arch:x86
da46b4258b978864afc9e1d1831d8f9f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FlushFileBuffers
CompareStringA
CompareStringW
MulDiv
DisableThreadLibraryCalls
CreateThread
LoadLibraryA
GetModuleHandleA
Sleep
VirtualProtect
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
GetCurrentThreadId
GetCommandLineA
HeapValidate
IsBadReadPtr
IsDebuggerPresent
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetModuleFileNameW
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetTimeZoneInformation
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcessHeap
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
WriteFile
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
SetFilePointer
GetConsoleCP
GetConsoleMode
InterlockedExchange
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetLocaleInfoW
CreateFileA
CloseHandle
SetEnvironmentVariableA
user32
GetAsyncKeyState
GetCursorPos
gdi32
DeleteObject
CreateCompatibleDC
CreateDIBSection
SetMapMode
GetDeviceCaps
CreateFontA
SelectObject
SetTextColor
SetBkColor
SetTextAlign
GetTextExtentPoint32A
DeleteDC
ExtTextOutA
Sections
.textbss Size: - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 398KB - Virtual size: 397KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ