od.pdb
Static task
static1
Behavioral task
behavioral1
Sample
377fe1ae1d85668ad358129a39fcec7d_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
377fe1ae1d85668ad358129a39fcec7d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
377fe1ae1d85668ad358129a39fcec7d_JaffaCakes118
-
Size
61KB
-
MD5
377fe1ae1d85668ad358129a39fcec7d
-
SHA1
b52277723a7e756180b887fa73ab5656d21a1eca
-
SHA256
0349d8b187d32e8227eb07733edabbc334a088c84ebfa75e457c22e241e6f8f8
-
SHA512
838cfc1ae9a75589e18d148f614a591cefa2a90a9bfb8d10960cdc862f9ee4da927608c96094effc8b6f660b949d984828465c1e414744fa2bcee8ccc803d374
-
SSDEEP
768:eYPc7XQznocrdYqjLYsJNEM1DZySMA92wHCt5KRbWzE7c5cTiq0N5N2Y2:2naLXzlZySVVHCL7E79mqy2Y2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 377fe1ae1d85668ad358129a39fcec7d_JaffaCakes118
Files
-
377fe1ae1d85668ad358129a39fcec7d_JaffaCakes118.dll windows:4 windows x86 arch:x86
f52e3c578065a4cd02d92745471a27e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
InterlockedDecrement
GetProcessHeap
HeapFree
EnumCalendarInfoExA
QueryPerformanceFrequency
CreateDirectoryW
LoadLibraryW
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringA
WaitForMultipleObjects
HeapAlloc
ExitProcess
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteValueW
RegEnumValueA
RegOpenKeyExW
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 512B - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 514B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ