d:\Ryan Project\Anti-AntiVirus\AntiAntiVirus_command1.8\A\bin\release\lee.pdb
Static task
static1
Behavioral task
behavioral1
Sample
441c9c9b8d0e2c4be004e5a8b4442079_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
441c9c9b8d0e2c4be004e5a8b4442079_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
441c9c9b8d0e2c4be004e5a8b4442079_JaffaCakes118
-
Size
84KB
-
MD5
441c9c9b8d0e2c4be004e5a8b4442079
-
SHA1
3ae6dd89faab71e4d754666b9b4430e9c1959bb4
-
SHA256
2e3fcd5509936fe7c1c9697b2a5b13aa7b7b5106631b26efa22acdb7bbcd79f5
-
SHA512
3bbe2798398b1af063ffb2489acc8be0c607d55e7a946a357ae1d9a96ebc5e62a110d5169bf2d4eed911c25a9d342db6010f93f1b9b1c6e246f7365f3637a05b
-
SSDEEP
1536:FR3p0GaRad1Yq6n4SFb7+arthAdaxtYx7:FR3p0PDecxtY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 441c9c9b8d0e2c4be004e5a8b4442079_JaffaCakes118
Files
-
441c9c9b8d0e2c4be004e5a8b4442079_JaffaCakes118.dll windows:4 windows x86 arch:x86
9a0521574cbdad5399eaa21d82bed084
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTempPathW
LoadLibraryW
GetProcAddress
FreeLibrary
OutputDebugStringW
IsBadReadPtr
VirtualAlloc
GetModuleFileNameA
GetCommandLineW
WideCharToMultiByte
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
GetModuleHandleA
VirtualAllocEx
WriteProcessMemory
SetThreadContext
ResumeThread
WaitForSingleObject
TerminateProcess
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
WriteFile
LoadLibraryA
InitializeCriticalSection
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
HeapSize
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
shell32
CommandLineToArgvW
Exports
Exports
Data
ExecuteFakeFile
ExecuteFile
Self
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.smiley Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.oex Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE