x:\Projects\Adware\Component\ChromeSetupHelper\Release(PROD)\chromesh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5ee8be9024adb24215f748d6f9dcd8c6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ee8be9024adb24215f748d6f9dcd8c6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5ee8be9024adb24215f748d6f9dcd8c6_JaffaCakes118
-
Size
304KB
-
MD5
5ee8be9024adb24215f748d6f9dcd8c6
-
SHA1
c991b94379e1dd16c06e0e0a184af0b27c70387f
-
SHA256
6effb366882274c662079676ce15c79204d6e75d0e56d32745a349afaa607931
-
SHA512
2369f4c2d80acd3a72c1222fef52200230930ef3785add5c1ea57088abf980d3a8d37671ac089861b157f20999110f4764574c90730c975eb3ea7c37b0a479b7
-
SSDEEP
6144:ztek8guqeYdJf+axxxxxxxD9kPxxxxxxZe5Eu:xmgnmyxxxxxxD9KxxxxxxQ5E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ee8be9024adb24215f748d6f9dcd8c6_JaffaCakes118
Files
-
5ee8be9024adb24215f748d6f9dcd8c6_JaffaCakes118.dll windows:4 windows x86 arch:x86
b751703664a7f1df74392d1e9b6a6e42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
DeleteFileW
OutputDebugStringW
CreateToolhelp32Snapshot
CreateDirectoryW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
Sleep
GetVersion
OutputDebugStringA
GetModuleHandleW
GetProcAddress
GetFileAttributesW
OpenFile
LoadLibraryW
FreeLibrary
IsBadReadPtr
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleFileNameA
GetTempPathW
SetLastError
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCurrentThreadId
GetCommandLineA
HeapAlloc
GetProcessHeap
HeapReAlloc
RtlUnwind
GetStringTypeA
GetStringTypeW
GetCPInfo
ExitProcess
LCMapStringA
LCMapStringW
TlsGetValue
FindClose
TlsSetValue
TlsFree
WriteFile
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
ReadFile
GetACP
GetOEMCP
IsValidCodePage
FlushFileBuffers
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
CreateFileA
CreateFileW
SetEndOfFile
GetSystemInfo
FormatMessageW
GetVersionExW
CreateMutexW
ReleaseMutex
WaitForSingleObject
lstrlenW
CopyFileW
OpenProcess
FindFirstFileW
InterlockedDecrement
lstrlenA
MultiByteToWideChar
DebugBreak
RemoveDirectoryW
CloseHandle
FindNextFileW
TerminateProcess
Process32NextW
Process32FirstW
TlsAlloc
InterlockedIncrement
user32
GetSystemMetrics
LoadStringW
CharNextW
wvsprintfW
UnregisterClassA
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
oleaut32
SysFreeString
SysAllocString
VariantClear
Exports
Exports
ChromeIsInstall
InstallProc
UnInstallProc
UpdateProc
Sections
.text Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.smiley Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.oex Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE