C:\Documents and Settings\FalkonZenX\Desktop\Hack 1.24c\AutoJoiner\Source\Release\ADLL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
736ecd1c836736f0624310eddcb373c6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
736ecd1c836736f0624310eddcb373c6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
736ecd1c836736f0624310eddcb373c6_JaffaCakes118
-
Size
33KB
-
MD5
736ecd1c836736f0624310eddcb373c6
-
SHA1
16b644dc2fa266601090c9177a17b484ed211a09
-
SHA256
90766425813256be89e19389b5650d82421000721385ec41f966ea338e6d1c3a
-
SHA512
4995f36e990f347789eb615d79c9194bc38fc7c6be237bd93802a2ab78d6becf870e9777f00d324e2a4eb010da4aac414fade8d6937f4524e37179fc201d11b3
-
SSDEEP
384:JQEh9SthKKQq5uxd5zbPvCcR7IKw12pDH8uIhw7lr4+lnu6EDHpG1/NC3vyyXd:JQ+9SwpC2kKukDcxhSkGnTEDd3vyy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 736ecd1c836736f0624310eddcb373c6_JaffaCakes118
Files
-
736ecd1c836736f0624310eddcb373c6_JaffaCakes118.dll windows:5 windows x86 arch:x86
e9335b2b2e64b1d630edc684057ae953
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
CallNextHookEx
wsprintfW
SetWindowsHookExW
UnhookWindowsHookEx
MessageBoxW
SendMessageW
kernel32
GetStartupInfoW
IsProcessorFeaturePresent
HeapSize
GetStringTypeW
MultiByteToWideChar
LCMapStringW
RtlUnwind
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetLastError
InterlockedDecrement
GetProcAddress
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
LoadLibraryW
WriteFile
GetModuleFileNameW
Exports
Exports
MsgInt
clearHook
setHook
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JOE Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ