c:\Users\Francesco\Desktop\basi ke uso\viplab\public -nero\Base D3D9 With Chams\Base D3D9\Release\Eagl3 Public.pdb
Static task
static1
Behavioral task
behavioral1
Sample
66fa8ffe45e4d791d92bffc9b7f01ddd_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
66fa8ffe45e4d791d92bffc9b7f01ddd_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
66fa8ffe45e4d791d92bffc9b7f01ddd_JaffaCakes118
-
Size
1.4MB
-
MD5
66fa8ffe45e4d791d92bffc9b7f01ddd
-
SHA1
44d07637e5d4762fb3a01a2490d67ce3293f032b
-
SHA256
757222924321b8453fffdfaf100993bb3be47b547514ea6c20412caed42127fb
-
SHA512
d6ed948eb5ec23621c148693ed23df962ebcd3e23cc5c1398fa8aa1f156e9aede7028ad48be113757227392c6127a648597b87706767ace242acc7613861277b
-
SSDEEP
24576:97FGWjplscArqi3RZ3CyiiSayKjRd1+0z8OTHiUcXMbqKSEg2UHOx1amW:BiZe9egm8IM9KSB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66fa8ffe45e4d791d92bffc9b7f01ddd_JaffaCakes118
Files
-
66fa8ffe45e4d791d92bffc9b7f01ddd_JaffaCakes118.dll windows:5 windows x86 arch:x86
ebc1902f2ab4fa80207679c70ea122ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateFileW
CloseHandle
UnmapViewOfFile
LockResource
LoadResource
SizeofResource
FindResourceA
FindResourceW
EnterCriticalSection
InterlockedExchange
InitializeCriticalSection
InterlockedCompareExchange
DeleteCriticalSection
LeaveCriticalSection
GetFullPathNameA
lstrcmpiA
HeapAlloc
GetProcessHeap
HeapFree
GetSystemTimeAsFileTime
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetLocalTime
InterlockedIncrement
InterlockedDecrement
GetModuleHandleW
IsDebuggerPresent
RaiseException
DebugBreak
lstrlenA
HeapValidate
IsBadReadPtr
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
FatalAppExitA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
CreateFileA
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
SetConsoleCtrlHandler
GetTimeFormatA
GetDateFormatA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
GetFileAttributesA
HeapSize
HeapReAlloc
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetTimeZoneInformation
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileMappingA
GetFileSize
MapViewOfFile
GetLastError
WriteFile
IsProcessorFeaturePresent
GetSystemInfo
OutputDebugStringA
VirtualFree
GetProcAddress
LoadLibraryA
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
CreateThread
GetModuleHandleA
Sleep
ExitProcess
VirtualAlloc
SetHandleCount
VirtualProtect
user32
MessageBoxA
GetSystemMetrics
GetAsyncKeyState
SetRect
keybd_event
gdi32
SetTextAlign
GetFontLanguageInfo
SetMapMode
CreateCompatibleDC
CreateFontIndirectA
CreateFontIndirectW
ExtTextOutW
MoveToEx
GetTextMetricsW
SetBkMode
SetBkColor
SetTextColor
GetCharacterPlacementW
GetCharacterPlacementA
SelectObject
DeleteObject
DeleteDC
CreateDIBSection
GetGlyphOutlineA
GetTextMetricsA
GetObjectW
GetObjectA
ExtTextOutA
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ