c:\Dokumente und Einstellungen\Careem - Younes\Desktop\Phoenix VIP Private v7 BaseHook\Hl2\Release\Phoenix VIP Private v7.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4600623831760cba502b852f04800e27_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4600623831760cba502b852f04800e27_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4600623831760cba502b852f04800e27_JaffaCakes118
-
Size
272KB
-
MD5
4600623831760cba502b852f04800e27
-
SHA1
13cb88a9ba8c7766df8d811465b6dcba226be250
-
SHA256
6d145faccfb1c5f04397682bada067588ef0e982d30bde0a9883140bba94fa3c
-
SHA512
c66f999ae1cbe57930550daeb6f55227ba0f903d4fb642b5e56bf5d9fdb4925bfb2f48ebdaa794b25c07ab4a23b7ecc8ce3b0a681479323e9112de1a8279a334
-
SSDEEP
3072:wDQCZpqeECj0EVnu5zG0EgLfArgdvHIMvjo6LzOuDAR3qEzb90cngxGAg0FuPiR:+dZptEkJus0nHHI3q6rx0IgcAOhKqD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4600623831760cba502b852f04800e27_JaffaCakes118
Files
-
4600623831760cba502b852f04800e27_JaffaCakes118.dll windows:4 windows x86 arch:x86
f9b979e16bd230944e016df59e5f63b0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualProtect
Sleep
CreateThread
GetVolumeInformationA
GetComputerNameA
GetModuleHandleA
GetModuleFileNameA
VirtualQuery
HeapAlloc
GetProcessHeap
ExitProcess
GetProcAddress
CloseHandle
GetLocaleInfoW
FlushFileBuffers
GetSystemInfo
VirtualAlloc
SetStdHandle
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
TerminateProcess
GetCurrentProcess
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
GetACP
GetOEMCP
GetCPInfo
SetFilePointer
InitializeCriticalSection
InterlockedExchange
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
RaiseException
LoadLibraryA
LCMapStringA
MultiByteToWideChar
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ReadFile
advapi32
GetUserNameA
shell32
ShellExecuteA
vstdlib
RandomSeed
Q_strncpy
Q_snprintf
KeyValuesSystem
Q_strnicmp
RandomFloat
tier0
Msg
g_VProfCurrentProfile
?EnterScope@CVProfNode@@QAEXXZ
?ExitScope@CVProfNode@@QAE_NXZ
Error
g_pMemAlloc
GetCPUInformation
?GetSubNode@CVProfNode@@QAEPAV1@PBDH0H@Z
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ