D:\My Projects\BorderSkin Projects\0.2.4 Edition\0.2.4 Edition\Border Skin Hook\Debug\Border Skin Hook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3ccd48b61cea872e81ba488adfc8d1dc_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ccd48b61cea872e81ba488adfc8d1dc_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3ccd48b61cea872e81ba488adfc8d1dc_JaffaCakes118
-
Size
450KB
-
MD5
3ccd48b61cea872e81ba488adfc8d1dc
-
SHA1
d68ede2307d9d2819c8288994e996f3b5c3bf1ca
-
SHA256
58db48ef716588dbcb08b053a985b262a9c939bbe905e80818127ed516c0023e
-
SHA512
06f2ce8c4aee4dd21d6881a3f9c73c48c62cb045745ce723abb443ff0abc1011e907f19515ef92a57729b9baf6d64de0ab32bdb322eee12777318473b31ab4df
-
SSDEEP
6144:pax2rtphpdMKfjN81lKpz3j664mh/Mb9slvjX4SjrCQ3j2OfR4wszouG:pax2rtpp7bIKT4mh/nv8S/CQ3j2O3sY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ccd48b61cea872e81ba488adfc8d1dc_JaffaCakes118
Files
-
3ccd48b61cea872e81ba488adfc8d1dc_JaffaCakes118.dll windows:5 windows x86 arch:x86
6c6789eac353f9860ef1d706e5bcffb4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
RegisterWindowMessageW
CallNextHookEx
GetSystemMetrics
SetWindowRgn
GetWindowRgn
SendMessageTimeoutW
GetWindowLongW
UnhookWindowsHookEx
SetWindowsHookExW
MessageBoxW
gdi32
CreateRectRgn
kernel32
CompareStringW
CompareStringA
FlushFileBuffers
SetEnvironmentVariableA
CreateFileA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
CloseHandle
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
GetCurrentThread
HeapValidate
IsBadReadPtr
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameW
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapSize
HeapReAlloc
VirtualAlloc
WriteFile
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
RtlUnwind
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetTimeFormatA
GetDateFormatA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
LCMapStringA
LCMapStringW
GetLocaleInfoW
GetTimeZoneInformation
SetFilePointer
GetConsoleCP
GetConsoleMode
Exports
Exports
StartWindowsHook
StopWindowsHook
_CallWndProc@12
Sections
.textbss Size: - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SHARE Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ