e:\work\malwar\hard\EngineDll\release\EngineDll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3e13c2832b26b798184e0a9e3b5794ca_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e13c2832b26b798184e0a9e3b5794ca_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3e13c2832b26b798184e0a9e3b5794ca_JaffaCakes118
-
Size
52KB
-
MD5
3e13c2832b26b798184e0a9e3b5794ca
-
SHA1
9c9c2412323447168fe346d7c5e72c3f9b8c3944
-
SHA256
5be0628c9b7e0863b43f09dcd82210cb5a94cb917590dea4e999f6f271363856
-
SHA512
2cb3daafb89aec4c1ceaf5b79562b297ebc6338c3ae7915e7d9544171ec37a1b05ee1432d1d7cb9d9612e1126db464ff11c4a32ab83d10d97e813baf2c4ce234
-
SSDEEP
768:6tZ+UmsXdWKa1S/1ioMS8Gm+5ieZku1VtFIM:k2I0D0mEVDtF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e13c2832b26b798184e0a9e3b5794ca_JaffaCakes118
Files
-
3e13c2832b26b798184e0a9e3b5794ca_JaffaCakes118.dll windows:4 windows x86 arch:x86
6db9f24032b1750446fe54e36c188b6b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
connect
WSAStartup
WSACleanup
recv
socket
closesocket
send
kernel32
GetThreadContext
SetThreadContext
WaitForSingleObject
VirtualFree
Sleep
ReadProcessMemory
CreateProcessA
GetProcAddress
VirtualAlloc
VirtualProtectEx
VirtualAllocEx
GetModuleHandleA
CreateMutexA
ReleaseMutex
CloseHandle
WriteProcessMemory
ResumeThread
CreateThread
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
UnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteFile
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
Exports
Exports
WaitForExit
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ