c:\Users\Alessandro\Desktop\Hack Alexas\Chams\Base D3D9 With Chams\Base D3D9\Release\Alexas D3D.pdb
Static task
static1
Behavioral task
behavioral1
Sample
96b0c5926e4c113deef8edf25750c741_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96b0c5926e4c113deef8edf25750c741_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
96b0c5926e4c113deef8edf25750c741_JaffaCakes118
-
Size
1.4MB
-
MD5
96b0c5926e4c113deef8edf25750c741
-
SHA1
91f469cfc7568679880cfb9eb8a94f68848979f7
-
SHA256
5a67319746f3c2efc3f7c69d6f57ff75f6b80f60619311c0f1d0add3b8cda555
-
SHA512
477de966b50a68b162b42eef4bc4e294058fa44d67611034957f022bd49cdea13a9ba634fd4040d6745ed364caba7f1d1744398f6f68f7bc6ad8a29422cd3f3f
-
SSDEEP
24576:0PqvFtupltebrm1T5CjaE09tluXE4G32iU0QyrteMNwI7kFJFuxa:zmmjaBMU4UqoeMNZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96b0c5926e4c113deef8edf25750c741_JaffaCakes118
Files
-
96b0c5926e4c113deef8edf25750c741_JaffaCakes118.dll windows:5 windows x86 arch:x86
45f7467d3e9ae580d86254deb3dd922f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
UnmapViewOfFile
LockResource
LoadResource
SizeofResource
FindResourceA
FindResourceW
EnterCriticalSection
InterlockedExchange
InitializeCriticalSection
InterlockedCompareExchange
DeleteCriticalSection
LeaveCriticalSection
GetFullPathNameA
lstrcmpiA
HeapAlloc
GetProcessHeap
HeapFree
GetSystemTimeAsFileTime
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetLocalTime
InterlockedIncrement
InterlockedDecrement
GetModuleHandleW
IsDebuggerPresent
RaiseException
DebugBreak
lstrlenA
HeapValidate
IsBadReadPtr
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
FatalAppExitA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
SetHandleCount
GetStdHandle
CloseHandle
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
SetConsoleCtrlHandler
GetTimeFormatA
GetDateFormatA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
GetFileAttributesA
HeapSize
HeapReAlloc
WriteConsoleW
OutputDebugStringW
LoadLibraryW
GetTimeZoneInformation
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateFileW
CreateFileA
CreateFileMappingA
GetFileSize
MapViewOfFile
GetLastError
WriteFile
IsProcessorFeaturePresent
GetSystemInfo
OutputDebugStringA
VirtualFree
GetProcAddress
LoadLibraryA
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
CreateThread
GetModuleHandleA
Sleep
ExitProcess
VirtualAlloc
GetFileType
VirtualProtect
user32
GetAsyncKeyState
SetRect
MessageBoxA
gdi32
CreateCompatibleDC
CreateFontIndirectW
ExtTextOutA
MoveToEx
SetTextAlign
SetMapMode
CreateFontIndirectA
GetFontLanguageInfo
GetTextMetricsW
SetBkMode
SetBkColor
SetTextColor
GetCharacterPlacementW
GetCharacterPlacementA
SelectObject
DeleteObject
DeleteDC
CreateDIBSection
GetGlyphOutlineA
GetTextMetricsA
GetObjectW
GetObjectA
ExtTextOutW
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 185KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ