dgeu3dnvp.c24
Static task
static1
Behavioral task
behavioral1
Sample
78a8a4a6974c0001b174ad2987edcdaa_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
78a8a4a6974c0001b174ad2987edcdaa_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
78a8a4a6974c0001b174ad2987edcdaa_JaffaCakes118
-
Size
79KB
-
MD5
78a8a4a6974c0001b174ad2987edcdaa
-
SHA1
4db87bbc665ab3ded0b22c46403ae7fe3e606b08
-
SHA256
2b33d505c80766b6a4d7da81e77321a2a2ce7b7142a010ae3548782b72836025
-
SHA512
927f97bb76184c19737d861148f1e0ab31da95c13a4d861e547c3a3b0c78f971f3cbb2e5b31b5cb6a9a85cf095856307f8e2459559bf09bacb0c0f371ea3bd97
-
SSDEEP
1536:E08bQuoAzb2OUeeO4Tphua+iHEwmusPCXw/RXsLAbm5lqDMnaUscabUF:MQu9z7U51hu5GGusKXw/WD5MDMnaUAw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78a8a4a6974c0001b174ad2987edcdaa_JaffaCakes118
Files
-
78a8a4a6974c0001b174ad2987edcdaa_JaffaCakes118.dll windows:4 windows x86 arch:x86
2c304f1ba1ef7e8e82557555be75711b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LCMapStringW
IsBadWritePtr
TerminateProcess
VirtualQuery
GetFileType
CreateTimerQueueTimer
ReleaseMutex
GetACP
DisconnectNamedPipe
WriteFile
ConnectNamedPipe
GetModuleHandleA
IsBadCodePtr
GetSystemInfo
FreeEnvironmentStringsW
InterlockedExchangeAdd
InitializeCriticalSection
InterlockedDecrement
VirtualProtect
SetEvent
HeapAlloc
GetCPInfo
GetLocaleInfoA
GetCurrentProcessId
WaitForSingleObject
IsBadReadPtr
SetUnhandledExceptionFilter
GetStdHandle
InterlockedExchange
GetModuleFileNameA
GetCurrentThreadId
WideCharToMultiByte
DuplicateHandle
GetVersionExA
LoadLibraryA
CreateEventA
GetTickCount
GetLastError
ResetEvent
CreateNamedPipeA
UnmapViewOfFile
LeaveCriticalSection
GetSystemTimeAsFileTime
DeleteCriticalSection
CreateMutexW
GetOEMCP
HeapDestroy
LCMapStringA
CreateThread
GetEnvironmentStrings
GetEnvironmentStringsW
DeleteTimerQueueTimer
OpenProcess
RtlUnwind
SetLastError
WaitForMultipleObjects
HeapFree
InterlockedCompareExchange
UnhandledExceptionFilter
QueryPerformanceCounter
GetStartupInfoA
MultiByteToWideChar
lstrcpyW
FreeEnvironmentStringsA
ExitThread
GetBinaryTypeA
lstrcatW
Sleep
EnterCriticalSection
user32
LoadIconA
DrawIcon
CreateIconFromResource
wsprintfW
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
msvcrt
_stricmp
_strnicmp
_wcsnset
wcsstr
fprintf
fflush
realloc
wcsncmp
wcstol
wcstod
calloc
_wtoi
_ltow
wcstok
malloc
free
wcslen
wcschr
swprintf
wcscmp
fgetws
wcscat
wcscpy
isdigit
exit
vwprintf
strtok
towupper
wprintf
printf
memmove
memset
memcpy
scanf
Exports
Exports
uskd
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ