o.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5a0ca1e2771130410a11c3ffc0e86c0a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a0ca1e2771130410a11c3ffc0e86c0a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5a0ca1e2771130410a11c3ffc0e86c0a_JaffaCakes118
-
Size
76KB
-
MD5
5a0ca1e2771130410a11c3ffc0e86c0a
-
SHA1
e609fc6698ade8217e305675d7c200e4f33a2043
-
SHA256
dc9bf2333329ab7355d4735fa2e3e6ddb1bb07929e2c977cfafd3be3aded9c94
-
SHA512
137eb67caec78cb7c8c26ff6bcb95329425034e13d054b95d5d7103d996cf032f6a4b0b5e5db3bea3aafb40474ea724321c9e1204d17bdaa954df94a8ee79a8b
-
SSDEEP
768:q0dWDoPQ70q6VETjtDQcUd6EsJ4Szvu4Isw+OklOBz4pz4EKyTpLZd3BTiVQotJv:jI8YgVijHUUVDvuOuGR4EJ/dFEQo7WU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a0ca1e2771130410a11c3ffc0e86c0a_JaffaCakes118
Files
-
5a0ca1e2771130410a11c3ffc0e86c0a_JaffaCakes118.dll windows:4 windows x86 arch:x86
3aa9d5de0ca000ef4d056074cf34489b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCPInfo
CreateFileMappingA
GetEnvironmentVariableA
FreeEnvironmentStringsW
VirtualFree
LocalAlloc
GetDiskFreeSpaceA
SetFileTime
CreateThread
DeleteFileW
LeaveCriticalSection
UnmapViewOfFile
InitializeCriticalSection
FlushViewOfFile
HeapDestroy
FreeLibrary
GetStdHandle
GetEnvironmentStrings
InterlockedDecrement
TlsGetValue
InterlockedExchange
SetHandleCount
GetStringTypeW
GetSystemInfo
GetTickCount
HeapReAlloc
CreateMutexA
SetLastError
VirtualAlloc
lstrlenW
DeleteFileA
GetFileSize
GetDiskFreeSpaceW
FreeEnvironmentStringsA
lstrcmpiA
GetACP
VirtualQuery
SetEndOfFile
CreateMutexW
GetCurrentProcessId
CreateFileW
TerminateProcess
IsBadReadPtr
IsDBCSLeadByte
GetFileType
GetLastError
MultiByteToWideChar
CreateEventA
GetCurrentProcess
DisableThreadLibraryCalls
TlsAlloc
CreateFileA
GetStringTypeExA
Sleep
QueryPerformanceCounter
OpenFileMappingA
InitializeCriticalSectionAndSpinCount
MapViewOfFile
GetEnvironmentStringsW
GetOEMCP
EnterCriticalSection
CompareFileTime
VirtualProtect
WriteFile
lstrlenA
GetFullPathNameW
WideCharToMultiByte
WaitForSingleObject
MoveFileW
OpenFileMappingW
GetVersionExA
SetUnhandledExceptionFilter
GetProcAddress
DeleteCriticalSection
GetCurrentThreadId
HeapAlloc
lstrcmpA
UnhandledExceptionFilter
GetFullPathNameA
TlsFree
MoveFileA
HeapFree
GetStartupInfoA
GetStringTypeA
ReleaseMutex
InterlockedIncrement
CreateFileMappingW
GetSystemTimeAsFileTime
SetFilePointer
LoadLibraryA
LocalFree
HeapCreate
LCMapStringA
CloseHandle
GetLocaleInfoA
SetEvent
SetEnvironmentVariableA
Exports
Exports
zotn
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 562B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ