c:\baseWatch\timeDegree\Nameforest\Generalsimilar\home.pdb
Static task
static1
Behavioral task
behavioral1
Sample
93d7b8618b69d64f00b175fa3b83c8a7_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
93d7b8618b69d64f00b175fa3b83c8a7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
93d7b8618b69d64f00b175fa3b83c8a7_JaffaCakes118
-
Size
208KB
-
MD5
93d7b8618b69d64f00b175fa3b83c8a7
-
SHA1
de4a66a1416c29eb0dc199f7103affe0cd6e2931
-
SHA256
d46b06c4e54b291c1c069192522d253520f16ea2c0665662257f88c632b1bb34
-
SHA512
bbc9a2f803caa063676a3a30b37bd5ec62ad2c628f5e4cd9a8d44a4e4dd0aceb2c389ae4b06da6b7a6406a9a9b1cdeca11b921dc34198c37d0bfee3ff3085b75
-
SSDEEP
6144:+WiT6BtfdcAXdK7Mp4Ik29CesuqVfDcT56BfL:+v6BxdcD7MpBJC/uqVuQp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 93d7b8618b69d64f00b175fa3b83c8a7_JaffaCakes118
Files
-
93d7b8618b69d64f00b175fa3b83c8a7_JaffaCakes118.dll windows:6 windows x86 arch:x86
f037fd858ffb9634d3f2f85667a3c6dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
OpenProcessToken
GetTokenInformation
AdjustTokenPrivileges
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupPrivilegeValueA
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
SetEntriesInAclA
kernel32
SetEndOfFile
HeapReAlloc
HeapSize
GetStringTypeW
CreateFileW
GetConsoleCP
WriteFile
FlushFileBuffers
SetStdHandle
GetProcessHeap
IsBadReadPtr
FindNextFileA
FindFirstFileA
RemoveDirectoryA
ExitProcess
GetWindowsDirectoryA
GetModuleFileNameA
LoadLibraryA
CreateSemaphoreA
WriteConsoleW
LCMapStringW
CreateEventA
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapAlloc
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileSizeEx
GetFileType
GetStdHandle
CloseHandle
HeapFree
GetModuleFileNameW
GetModuleHandleExW
ReadFile
DecodePointer
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
SetLastError
GetLastError
TlsGetValue
TlsAlloc
MulDiv
FindClose
Sleep
VirtualProtect
LocalFree
LocalAlloc
GlobalFree
GlobalUnlock
GlobalAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
RtlUnwind
InterlockedFlushSList
user32
FrameRect
SetWindowsHookExA
WindowFromPoint
LoadIconA
GetWindowTextLengthA
ReleaseCapture
CloseClipboard
OffsetRect
SystemParametersInfoA
RegisterClassExA
ClientToScreen
EndDialog
GetMessageA
gdi32
SelectObject
MoveToEx
StretchBlt
SetPixel
SetBkMode
PatBlt
LineTo
GetTextExtentPoint32A
ExcludeClipRect
ole32
OleInitialize
CoInitialize
OleUninitialize
CoUninitialize
CoCreateInstance
ws2_32
recvfrom
WSACleanup
WSAStartup
getprotobynumber
socket
htonl
htons
recv
getservbyname
send
setsockopt
wininet
HttpOpenRequestA
FtpOpenFileA
InternetSetOptionA
InternetReadFile
InternetConnectA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
shlwapi
PathFindFileNameA
PathQuoteSpacesA
PathIsFileSpecA
winspool.drv
DocumentPropertiesA
GetPrinterA
EnumPrintersA
OpenPrinterA
ClosePrinter
GetPrinterDataA
winmm
mciSendCommandA
timeEndPeriod
timeBeginPeriod
PlaySoundA
mciGetErrorStringA
comdlg32
CommDlgExtendedError
ChooseFontA
FindTextA
GetSaveFileNameA
GetOpenFileNameA
comctl32
ImageList_EndDrag
ImageList_GetIcon
ImageList_GetBkColor
ImageList_GetImageCount
ImageList_Create
ImageList_GetDragImage
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 948B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ