pdb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
43565ad3b3fea5b61d6b09cdb4b731ae_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
43565ad3b3fea5b61d6b09cdb4b731ae_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
43565ad3b3fea5b61d6b09cdb4b731ae_JaffaCakes118
-
Size
77KB
-
MD5
43565ad3b3fea5b61d6b09cdb4b731ae
-
SHA1
5a28595609f52c2998deb6dff40649681976d754
-
SHA256
325bd95774455b2c8c75db4f8f16b6ec5b30b6b295fa8976dfad0d21c6cf1adf
-
SHA512
d41dbf4addf118955e0588fcfd30e3a6defdbd8e906d104ca8aa7f099b46e5ea8ff52f636f472e6e26157c2e9669bb8190431ea255d67c4f408be81a16348bc9
-
SSDEEP
1536:dX1VLZUbMGjNxvst9lhE3wGSJmiqJmbdkzHjumGbp9HeCVQ:dX1xZUbXjNxvsDlhiLSJmiqC2bUbpVVQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43565ad3b3fea5b61d6b09cdb4b731ae_JaffaCakes118
Files
-
43565ad3b3fea5b61d6b09cdb4b731ae_JaffaCakes118.dll windows:4 windows x86 arch:x86
3e2982220984e765b16ec8f55c586e6a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
TlsGetValue
lstrcmpA
GetCurrentThreadId
DeleteCriticalSection
GetCurrentProcessId
DisableThreadLibraryCalls
FreeEnvironmentStringsW
GetStdHandle
TlsFree
GetOEMCP
QueryPerformanceCounter
WideCharToMultiByte
LocalAlloc
LCMapStringA
VirtualFree
InterlockedIncrement
MapViewOfFile
LoadLibraryA
HeapReAlloc
GetDiskFreeSpaceA
VirtualProtect
GetFileType
CreateFileMappingW
EnterCriticalSection
CreateMutexW
UnmapViewOfFile
DeleteFileA
InterlockedExchange
GetSystemInfo
SetHandleCount
GetProcAddress
GetTickCount
DeleteFileW
GetVersionExA
CloseHandle
SetFilePointer
SetFileTime
TlsAlloc
IsDBCSLeadByte
WaitForSingleObject
Sleep
GetFullPathNameW
ReleaseMutex
SetLastError
CreateFileW
CompareFileTime
GetLocaleInfoA
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CreateThread
HeapFree
GetDiskFreeSpaceW
HeapDestroy
InterlockedDecrement
GetCPInfo
HeapCreate
GetSystemTimeAsFileTime
SetEndOfFile
CreateFileMappingA
WriteFile
CreateMutexA
FreeEnvironmentStringsA
TerminateProcess
GetStringTypeExA
GetCurrentProcess
UnhandledExceptionFilter
GetLastError
VirtualAlloc
MoveFileA
MoveFileW
FlushViewOfFile
GetACP
SetUnhandledExceptionFilter
FreeLibrary
lstrlenW
GetEnvironmentStrings
HeapAlloc
lstrlenA
GetEnvironmentVariableA
OpenFileMappingA
InitializeCriticalSection
lstrcmpiA
LeaveCriticalSection
CreateEventA
VirtualQuery
GetStringTypeW
GetFullPathNameA
CreateFileA
GetEnvironmentStringsW
GetFileSize
GetStringTypeA
GetStartupInfoA
LocalFree
OpenFileMappingW
IsBadReadPtr
SetEvent
EnumDateFormatsExA
Exports
Exports
uqkhiwcye
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ