c:\Documents and Settings\Tan\Desktop\All of cj's stuff goes here!\420 - src\Hl2\Release\HL2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
851e22a0829873cb83cb6645e16008e0_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
851e22a0829873cb83cb6645e16008e0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
851e22a0829873cb83cb6645e16008e0_JaffaCakes118
-
Size
302KB
-
MD5
851e22a0829873cb83cb6645e16008e0
-
SHA1
47ef66211dc0706e0b12c9096bec3bdc54b8d894
-
SHA256
a59bc00f5b0da6cb588699da33ca0128c79fe7794448cb5c93a299a5ae21bc2e
-
SHA512
209dcc09ef503d1019422754b5ba782ebdeef2bcb1dd2120c5d812395298147052f31b9b63ef191c8dbead8a0a3b7952ce21c4c7a438498df6a2e81a5bfa8df5
-
SSDEEP
3072:D0fleia4f6Vf59Pj7UzZCq/pIJabnkHrtDwfEWbXinhh27ndBEFe/szAg0FuTcM8:QflXHfgB5U9/pILlo9WyRBEM0zAOtkZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 851e22a0829873cb83cb6645e16008e0_JaffaCakes118
Files
-
851e22a0829873cb83cb6645e16008e0_JaffaCakes118.dll windows:4 windows x86 arch:x86
3bc12e811723462b74c01676045de794
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
winmm
timeGetTime
kernel32
TlsGetValue
SetFilePointer
GetProcAddress
GetModuleHandleA
GetCurrentProcess
WriteProcessMemory
Sleep
VirtualProtect
QueryPerformanceCounter
CreateThread
DisableThreadLibraryCalls
GetModuleFileNameA
IsBadReadPtr
Module32Next
Module32First
CreateToolhelp32Snapshot
ExitProcess
WritePrivateProfileStringA
GetPrivateProfileIntA
VirtualQuery
HeapAlloc
GetProcessHeap
IsBadCodePtr
IsBadWritePtr
SetUnhandledExceptionFilter
GetOEMCP
CloseHandle
FlushFileBuffers
ReadFile
GetLocaleInfoW
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetSystemInfo
VirtualAlloc
LoadLibraryA
InterlockedExchange
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
GetLocalTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TerminateProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
RaiseException
LCMapStringA
LCMapStringW
InitializeCriticalSection
user32
wsprintfA
FindWindowA
GetAsyncKeyState
tier0
Msg
g_VProfCurrentProfile
?GetSubNode@CVProfNode@@QAEPAV1@PBDH0H@Z
?EnterScope@CVProfNode@@QAEXXZ
?ExitScope@CVProfNode@@QAE_NXZ
Error
g_pMemAlloc
GetCPUInformation
vstdlib
RandomSeed
RandomFloat
Q_strncpy
Q_snprintf
KeyValuesSystem
Q_strnicmp
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ