e:\Projects\VD200806\TFG70\Code&Bin\src\GUI\bin\ExceptionProc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
333a185718cd37230be0b6c70124d39b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
333a185718cd37230be0b6c70124d39b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
333a185718cd37230be0b6c70124d39b_JaffaCakes118
-
Size
97KB
-
MD5
333a185718cd37230be0b6c70124d39b
-
SHA1
3ead60bc3941d0577cc04add4a5c4b647e988c48
-
SHA256
18e19eba8abfa4f91ba070fba47b62549b0d280f9b234c65a88f78030035a6a9
-
SHA512
d61ab34fb70cff92efceab4f1c65b853176cb36198b8fa4aa7d22c6882246c153338e868900854bb6f01ea8220fb2ad622c45d1d7c9a944f360b8cea28f294af
-
SSDEEP
3072:xBQFUvxOlmEAnkReagBTVUI5KNNI55LLnw3tE+X:xBQFU4lmEAnkReagBTVUaKs5Rv+X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 333a185718cd37230be0b6c70124d39b_JaffaCakes118
Files
-
333a185718cd37230be0b6c70124d39b_JaffaCakes118.dll windows:4 windows x86 arch:x86
18dde0c385d81775cc921fb158fd3fcc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
dbghelp
SymFromAddr
SymGetModuleBase64
StackWalk64
SymInitialize
SymSetOptions
SymFunctionTableAccess64
MiniDumpWriteDump
SymGetLineFromAddr64
SymCleanup
SymGetOptions
psapi
GetModuleFileNameExW
EnumProcessModules
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
CloseHandle
WriteFile
CreateFileW
VirtualQuery
GetVersionExW
lstrcpynW
GetModuleFileNameW
lstrlenW
SetUnhandledExceptionFilter
GetCurrentProcessId
MultiByteToWideChar
Process32FirstW
CreateFileA
GetSystemInfo
GetCurrentProcess
Process32NextW
CreateToolhelp32Snapshot
GetCurrentThread
GetCurrentThreadId
GetFileTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileSize
GetPrivateProfileIntW
SetFilePointer
OutputDebugStringW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateProcessW
GetLastError
GetConsoleMode
FlushFileBuffers
GlobalMemoryStatus
HeapAlloc
GetConsoleCP
RtlUnwind
MoveFileW
DeleteFileW
GetLocalTime
GetCommandLineA
HeapFree
GetVersionExA
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
RaiseException
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
user32
MessageBoxW
SendMessageW
wsprintfW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
shlwapi
StrStrIW
Exports
Exports
ExceptionProc
InitExceptionProc
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ