f:\ReEnterExtended\bin\R+DCRT\ConfigD.pdb
Static task
static1
Behavioral task
behavioral1
Sample
731b7eaa379c55e8550bd33cc78c126a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
731b7eaa379c55e8550bd33cc78c126a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
731b7eaa379c55e8550bd33cc78c126a_JaffaCakes118
-
Size
108KB
-
MD5
731b7eaa379c55e8550bd33cc78c126a
-
SHA1
fb67ce40d6ca5a0c41638c923c3cb9a6ed32dd96
-
SHA256
8d59162e81fa57b9d4aabde89cbc9670dd702a47f206248bfb68076451dddd4a
-
SHA512
dcdd3ff6f82c864c2071d33b76352dfb32e51d7d865d52c97a73d3502bfc0c4e1b8b70b8a4a3faa1b23a6f9de0265f02050edc3198129e073cdaa45fb653c92a
-
SSDEEP
3072:mXqII4UAcLFC95uoOzepMXjLLQwvgx1CKVrOAwGylDF:0UAcJCuoOqpaL0cgx1nrOAwDJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 731b7eaa379c55e8550bd33cc78c126a_JaffaCakes118
Files
-
731b7eaa379c55e8550bd33cc78c126a_JaffaCakes118.dll windows:4 windows x86 arch:x86
4ae3e61aa51a8a1686084dba113833a0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InterlockedDecrement
lstrcmpiW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
InterlockedIncrement
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLastError
lstrlenW
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
RaiseException
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
GetSystemTimeAsFileTime
user32
CharNextW
DestroyWindow
ShowWindow
GetDlgItem
UnregisterClassA
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
ole32
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SysFreeString
VarUI4FromStr
msvcp80
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??$?M_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA_NABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
msvcr80
__clean_type_info_names_internal
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
??3@YAXPAX@Z
free
_CxxThrowException
__CxxFrameHandler3
??2@YAPAXI@Z
malloc
memcpy_s
wcsncpy_s
??_V@YAXPAX@Z
_recalloc
memset
_invalid_parameter_noinfo
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABV01@@Z
_purecall
memmove_s
_except_handler4_common
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
Exports
Exports
getClientModule
getCountryCode
getNewAccEntries
initNewAccountDlg
isDefaultAccountRealMoney
showPlayMoneyDialog
specifyDSURLParams
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ