c:\Documents and Settings\Administrator\桌面\48\Shell\Release\Shell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
34ed189a5d16e724d58a711c003cd8ae_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34ed189a5d16e724d58a711c003cd8ae_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
34ed189a5d16e724d58a711c003cd8ae_JaffaCakes118
-
Size
204KB
-
MD5
34ed189a5d16e724d58a711c003cd8ae
-
SHA1
e05a1895d0d6335de30adab2150cd71b607ab84f
-
SHA256
3466b83dc265147eafca3e36c70f3949310d7f8e78634512e3b81253141a41ed
-
SHA512
aa80f498c5a1025633884124813b81d70436920ab87c359cf7b1aa980fddbdab201e9fe33cb45ba5ab48f957fcfc122c6f12d0c65cffc7c1596cbbe3c721aa7e
-
SSDEEP
6144:BfbYR7lj88s+75bnGUS/Hi2KAIvfH3OiUy:BfbYR7lj88s+75bnGUS/Hi21efHjUy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34ed189a5d16e724d58a711c003cd8ae_JaffaCakes118
Files
-
34ed189a5d16e724d58a711c003cd8ae_JaffaCakes118.dll windows:4 windows x86 arch:x86
cc3a1e995a9d1a91df685b3b42af9d5f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
htonl
sendto
closesocket
select
inet_ntoa
WSAStartup
setsockopt
send
socket
inet_addr
htons
connect
WSACleanup
gethostbyname
wininet
InternetReadFile
InternetOpenW
InternetCloseHandle
InternetOpenUrlW
kernel32
Sleep
SetEvent
WaitForSingleObject
lstrlenW
CreateThread
CreateEventW
lstrcpyW
WideCharToMultiByte
GetTickCount
GetVersionExW
InterlockedExchange
GetACP
GetLocaleInfoA
InitializeCriticalSection
DeleteCriticalSection
lstrcatW
GetProcAddress
GetModuleHandleW
GlobalFree
GlobalAlloc
CreateFileW
GetModuleFileNameW
GetModuleFileNameA
GetSystemDirectoryW
OpenFile
CloseHandle
GetLastError
MapViewOfFile
CreateFileMappingW
UnmapViewOfFile
ExitProcess
CreateProcessW
OutputDebugStringA
CopyFileW
DeleteFileW
FindClose
FindNextFileW
GetFullPathNameW
FindFirstFileW
SetCurrentDirectoryW
GetPrivateProfileStringW
Process32NextW
GetCurrentProcessId
Process32FirstW
CreateToolhelp32Snapshot
DeviceIoControl
GetCurrentProcess
GetExitCodeThread
VirtualFree
HeapFree
WriteProcessMemory
VirtualAllocEx
OpenProcess
TerminateProcess
GetCurrentThreadId
SetFilePointer
ReadFile
DuplicateHandle
LoadLibraryA
RtlUnwind
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
VirtualQuery
HeapDestroy
HeapCreate
VirtualProtect
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
WriteFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeA
GetStringTypeW
GetOEMCP
SetStdHandle
FlushFileBuffers
GetSystemInfo
SetEndOfFile
HeapAlloc
CreateRemoteThread
LeaveCriticalSection
user32
RegisterClassExW
ShowWindow
UpdateWindow
GetMessageW
DispatchMessageW
TranslateMessage
DefWindowProcW
PostQuitMessage
SetWindowLongW
GetClientRect
GetWindowLongW
CreateWindowExW
wsprintfW
advapi32
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegCreateKeyW
ChangeServiceConfigW
RegDeleteKeyW
RegOpenKeyW
RegEnumKeyW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegDeleteValueW
RegCreateKeyA
RegSetValueExA
RegOpenKeyExW
CreateServiceW
RegCloseKey
RegSetValueExW
ole32
CoGetClassObject
OleSetContainedObject
OleInitialize
oleaut32
VariantClear
SysAllocString
VariantInit
shlwapi
PathRemoveFileSpecW
SHDeleteKeyW
psapi
GetModuleFileNameExW
GetModuleBaseNameW
Exports
Exports
DestoryAntiVirus
GetDllModuleControlInit
StartShell
StartShell_A
StartShell_B
StartShell_C
StartShell_D
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shell__ Size: 4KB - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ