E:\MyProject\2011\RewriteDM-bank\playUnIEvoke\Release\playUnIEvoke.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5b4087031a315659ba40c2c3778ab021_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b4087031a315659ba40c2c3778ab021_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5b4087031a315659ba40c2c3778ab021_JaffaCakes118
-
Size
519KB
-
MD5
5b4087031a315659ba40c2c3778ab021
-
SHA1
43b7a174de06ab4ed0b2b1a60b19f716c9c2a5d0
-
SHA256
60993dbf96a0a4b5d0c5334fcb049950a0e496086437f767c6fb22c3c47662ae
-
SHA512
d1cd5888b3a1882ce42846dac6df6f71968babb17e67fcb4e4da3ca851b0e0c8865dc12ad682262aa22a1241f869e941005c872d5ba4419a9becfb5445861b5b
-
SSDEEP
12288:I/thw5OXIi2n/VwCWFhtOYSSxOqSwXz1Ynb7DOE7n9IPEYpsUrNBYX:I/45/ebNSQanb7KE7n9k5pXTU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b4087031a315659ba40c2c3778ab021_JaffaCakes118
Files
-
5b4087031a315659ba40c2c3778ab021_JaffaCakes118.dll windows:5 windows x86 arch:x86
f5b941f96b9c84598f5374ed0cb38f0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
WSAStartup
WSACleanup
gethostbyname
ole32
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
wininet
HttpOpenRequestA
InternetCrackUrlA
InternetReadFile
HttpSendRequestA
GetUrlCacheEntryInfoA
InternetCloseHandle
InternetConnectA
InternetOpenA
urlmon
URLDownloadToFileA
kernel32
MultiByteToWideChar
WideCharToMultiByte
CreateFileA
GetFileSize
ReadFile
CloseHandle
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
Sleep
FindFirstFileA
FindClose
SetProcessWorkingSetSize
GetCurrentProcess
GetTickCount
DeviceIoControl
GetFullPathNameA
FindResourceA
lstrlenA
FreeLibrary
LoadResource
InterlockedIncrement
InterlockedDecrement
QueryDosDeviceA
UnlockFile
GetLogicalDrives
InitializeCriticalSectionAndSpinCount
SizeofResource
LeaveCriticalSection
IsDBCSLeadByte
lstrlenW
RaiseException
CreateDirectoryA
GetLastError
lstrcmpiA
GetProcAddress
RemoveDirectoryA
EnterCriticalSection
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
DeleteCriticalSection
CreateThread
WaitForSingleObject
lstrcpyA
lstrcatA
lstrcmpA
FindNextFileA
SetFileAttributesA
DeleteFileA
lstrcpynA
GetEnvironmentVariableA
GetCurrentDirectoryA
CopyFileA
GetWindowsDirectoryA
FlushInstructionCache
GetCurrentThreadId
SetLastError
SetFilePointer
GetLocalTime
GetSystemTimeAsFileTime
GetFileInformationByHandle
GetPrivateProfileStringA
GetCompressedFileSizeA
GetSystemDirectoryA
GetVolumeInformationA
GetVersionExA
CreateProcessA
SetErrorMode
CreateEventA
CreateMutexA
WaitForMultipleObjects
SetEvent
OpenEventA
GetProcessHeap
LocalFree
GetLocaleInfoW
GetModuleFileNameW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStartupInfoW
GetFileType
GetStdHandle
SetHandleCount
HeapDestroy
HeapCreate
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RtlUnwind
GetCommandLineA
GetFileAttributesA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
DecodePointer
EncodePointer
InitializeCriticalSection
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
SetStdHandle
LoadLibraryW
WriteConsoleW
SetEndOfFile
CreateFileW
WriteFile
user32
GetWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
MapWindowPoints
GetMonitorInfoA
MonitorFromWindow
ShowWindow
UpdateWindow
CreateWindowExA
UnregisterClassA
CallWindowProcA
DefWindowProcA
LoadCursorA
GetClassInfoExA
RegisterClassExA
SetWindowLongA
SetWindowTextA
KillTimer
SetWindowPos
SetActiveWindow
SetTimer
MoveWindow
AdjustWindowRectEx
SendMessageA
DestroyWindow
GetWindowLongA
GetParent
CharNextA
GetClientRect
GetWindowRect
GetSystemMetrics
LoadImageA
PostQuitMessage
gdi32
DeleteObject
advapi32
RegSetValueExA
RegQueryValueA
RegSetValueA
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
oleaut32
SysAllocString
VariantClear
SysAllocStringLen
SysFreeString
VarUI4FromStr
Exports
Exports
Always
ConfigAd
PutTestSpecial
_2
msnpop
qqadpop
qweAwse
Sections
.text Size: 311KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ