d:\projects\svnprojects\OrbitDM\branches\4.1.0.2\bmdl\GrabDll\Release\GrabDll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
851cd79f10da2abb9209419b59578a03_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
851cd79f10da2abb9209419b59578a03_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
851cd79f10da2abb9209419b59578a03_JaffaCakes118
-
Size
388KB
-
MD5
851cd79f10da2abb9209419b59578a03
-
SHA1
740f87131b3c9669105f337030941fd85782a4ff
-
SHA256
d1aa32c83a1043ba1b28baf4f623aeaa0b536767faf7bab4c15b6b0631b41d60
-
SHA512
33625a982df2b8e1584ebf425b3149c87b21effa22e149cf3de5d5cfec875758c0959f5d35954202140cf352411cc3a5056b470cc8661d20356432f3d0f28dea
-
SSDEEP
3072:8oeE4M1RPQCJkd+nLihndjbr5pI3xzdBKLA2BrkM2UWrDzXdfRK5Aj9qh+udQMhL:PRR4CE/iVSLhj2UQXK6BqoqQMAhsSxh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 851cd79f10da2abb9209419b59578a03_JaffaCakes118
Files
-
851cd79f10da2abb9209419b59578a03_JaffaCakes118.dll windows:4 windows x86 arch:x86
75ae1b35e6e654c0090d4f36b1351e3f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
winmm
timeGetTime
shlwapi
StrStrIA
kernel32
TlsFree
CompareStringW
CompareStringA
FlushFileBuffers
GetProcAddress
GetModuleHandleA
CreateThread
Sleep
CloseHandle
TerminateThread
IsBadReadPtr
GetModuleFileNameA
Thread32Next
SuspendThread
OpenThread
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ResumeThread
GetThreadContext
SetEvent
GetCurrentThreadId
VirtualProtect
WaitForSingleObject
CreateEventA
CreateMutexA
OpenEventA
ResetEvent
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MapViewOfFile
GetLastError
CreateFileMappingA
UnmapViewOfFile
CreateFileA
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TlsGetValue
TlsAlloc
TlsSetValue
SetEnvironmentVariableA
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
FatalAppExitA
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetLocaleInfoW
user32
CharNextA
wsprintfA
ws2_32
inet_ntoa
ntohs
Exports
Exports
InitDll
UnInitDll
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ