c:\FireFox Downloads\RoyalHack v1.0d Base\RetoxHook\Hl2\Release\HL2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4188214778cac70900347ba5a2a0a513_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4188214778cac70900347ba5a2a0a513_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4188214778cac70900347ba5a2a0a513_JaffaCakes118
-
Size
276KB
-
MD5
4188214778cac70900347ba5a2a0a513
-
SHA1
00b2327c1af611e7e0fee477d9490c7d75424052
-
SHA256
a6ae024167e547a4cac397ae51c509ae3c1cafed7500fbca24d8f967b911b236
-
SHA512
1fe9a9ca0435b610e06d9f6c7123ed7635cdf94cece238566a59b291396d8fc9301b3ae4312a689c38b29ba315c20dd9b948bf277b5d53031fd00125063b2f13
-
SSDEEP
6144:yCIIb3mLQtCR7sq6DgQyDLSY7tSEgN9AOTENFfyK8iQC+il+c:DI+u6CR7sqp9r7t6PC+tc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4188214778cac70900347ba5a2a0a513_JaffaCakes118
Files
-
4188214778cac70900347ba5a2a0a513_JaffaCakes118.dll windows:4 windows x86 arch:x86
bd8399f2b63feb7fc7c0a458a97fb0be
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
GetModuleHandleA
VirtualProtect
Sleep
CreateThread
ExitProcess
GetModuleFileNameA
VirtualQuery
HeapAlloc
GetProcessHeap
CloseHandle
GetLocaleInfoW
FlushFileBuffers
GetSystemInfo
VirtualAlloc
SetStdHandle
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetLastError
FlushInstructionCache
GetCurrentProcess
LoadLibraryA
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TerminateProcess
TlsAlloc
GetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
SetFilePointer
RaiseException
InitializeCriticalSection
LCMapStringA
MultiByteToWideChar
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ReadFile
user32
GetAsyncKeyState
vstdlib
RandomSeed
Q_strncpy
Q_snprintf
KeyValuesSystem
Q_strnicmp
RandomFloat
tier0
Msg
g_VProfCurrentProfile
?EnterScope@CVProfNode@@QAEXXZ
?ExitScope@CVProfNode@@QAE_NXZ
Error
g_pMemAlloc
GetCPUInformation
?GetSubNode@CVProfNode@@QAEPAV1@PBDH0H@Z
Sections
.text Size: 196KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ