decriaapiifietr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4242ca7f02463f159410908d53615c1b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4242ca7f02463f159410908d53615c1b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4242ca7f02463f159410908d53615c1b_JaffaCakes118
-
Size
49KB
-
MD5
4242ca7f02463f159410908d53615c1b
-
SHA1
950a14452bf70829eef591b7afbb6b524f0420ad
-
SHA256
f359a4c00f571633f7cf3e7aee3c64936c72f91aba1bc71302afbf769cc0f9e3
-
SHA512
f3c931fcf37354690d7bb3194afc9cf4cdb743538ad32836b72127deb013a9ae4ef78f835ebffb2c7856d9e3b473e71aa9929ccfd2ead932a2e091625933d96b
-
SSDEEP
768:NvOUeTrRELOeQq+cZZZV6UQlex9cKVzNJJPVuRdzrwTPcpQ:NonWuq+KBQlccGPuETPc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4242ca7f02463f159410908d53615c1b_JaffaCakes118
Files
-
4242ca7f02463f159410908d53615c1b_JaffaCakes118.dll windows:4 windows x86 arch:x86
4eaa6a39019fdde8ba1831059dc3318b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FreeLibrary
LoadLibraryW
InterlockedIncrement
InterlockedDecrement
lstrcpyW
CloseHandle
MulDiv
SetEvent
MultiByteToWideChar
GetCurrentThreadId
GetProcAddress
GlobalAlloc
LoadLibraryA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateEventW
GetTickCount
GetTempPathW
GetTempFileNameW
CopyFileW
ReadFile
GetFileAttributesW
CreateFileW
WriteFile
GlobalFree
DeleteFileW
ResetEvent
GetLocalTime
lstrcatW
GetUserDefaultLCID
GetCurrentDirectoryW
FormatMessageW
LocalFree
lstrcmpW
GetModuleHandleA
QueryPerformanceCounter
lstrlenW
advapi32
IsValidSid
msvcrt
exit
Exports
Exports
nncz
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ