D:\Loaders-Stuff[CO]\GuardShield\Loader_6609\Out\Env_DX8\GuardShield.pdb
Static task
static1
Behavioral task
behavioral1
Sample
710c4cb7a8442d2b27ecd97398f3e686_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
710c4cb7a8442d2b27ecd97398f3e686_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
710c4cb7a8442d2b27ecd97398f3e686_JaffaCakes118
-
Size
695KB
-
MD5
710c4cb7a8442d2b27ecd97398f3e686
-
SHA1
d940a34aa601d755c65511caa5ce59663d1e52bc
-
SHA256
e0c4237e9fcdae1c44f8b592edb148db2e4f3dc3ca113f72db5efd17a29483c6
-
SHA512
639da0b8d0e6880573e386e448c824a473ff4ffb037f8fb68340cfac76d5d8d468ce6404b4ee0c04a3b834e328fb09f3a809d2069d2276bb8b993c8fecffc44a
-
SSDEEP
12288:/K/oTFiP3uDWkLPQtaD51REaGKAtoqtsWMH4yGakfRX487OTqRlFSO:/g0H5TGhLQOaz8iORvSO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 710c4cb7a8442d2b27ecd97398f3e686_JaffaCakes118
Files
-
710c4cb7a8442d2b27ecd97398f3e686_JaffaCakes118.dll windows:5 windows x86 arch:x86
127522ad2af39e4193725a9bfad4392b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
ntohs
inet_ntoa
recv
connect
send
closesocket
kernel32
GetProcAddress
GetCurrentProcess
GetCurrentThread
GetThreadContext
IsDebuggerPresent
CheckRemoteDebuggerPresent
CloseHandle
GetModuleHandleA
GetVersionExW
GetCurrentDirectoryW
DisableThreadLibraryCalls
VirtualProtect
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetLastError
ReadFile
CreateFileW
OpenProcess
Sleep
GetModuleHandleW
ExitProcess
SuspendThread
ResumeThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
VirtualQuery
LoadLibraryA
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
GetCurrentDirectoryA
TerminateProcess
CreateThread
GetCurrentThreadId
GetCommandLineW
ReadProcessMemory
WriteProcessMemory
AllocConsole
SetConsoleTitleW
GetConsoleWindow
Thread32First
Thread32Next
GetExitCodeThread
SetEvent
WaitForSingleObject
CreateEventW
VirtualAlloc
OpenThread
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
ReadConsoleW
GetTimeZoneInformation
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetProcessHeap
HeapQueryInformation
HeapSize
HeapReAlloc
HeapFree
OutputDebugStringW
OutputDebugStringA
WriteFile
GetACP
EnumSystemLocalesW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEndOfFile
SetEnvironmentVariableA
SetStdHandle
TerminateThread
GetUserDefaultLCID
IsValidLocale
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
InterlockedCompareExchange
SetThreadContext
FlushInstructionCache
VirtualFree
RaiseException
RtlUnwind
InterlockedFlushSList
FreeLibrary
GetModuleHandleExW
GetModuleFileNameA
GetModuleFileNameW
HeapAlloc
HeapValidate
GetSystemInfo
GetStdHandle
GetFileType
WriteConsoleW
user32
UnhookWindowsHookEx
SetWindowsHookExW
WindowFromPoint
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
EnumChildWindows
CallNextHookEx
FindWindowA
MessageBoxA
GetWindowRect
GetWindowTextA
SetWindowTextA
CallWindowProcA
PostQuitMessage
ShowWindow
GetWindow
EnumWindows
GetWindowTextW
IsWindowVisible
GetWindowThreadProcessId
GetForegroundWindow
GetActiveWindow
advapi32
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptReleaseContext
CryptAcquireContextW
psapi
GetModuleInformation
EmptyWorkingSet
GetModuleFileNameExW
Exports
Exports
Initialize
Sections
.text Size: 503KB - Virtual size: 503KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ