e:\5\68\50\45\25\68\24\wild\Less\25\wind\64\13\83\3\Material\Solution\Fine.pdb
Static task
static1
Behavioral task
behavioral1
Sample
99f900d6050311138fde067981255976_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
99f900d6050311138fde067981255976_JaffaCakes118
-
Size
282KB
-
MD5
99f900d6050311138fde067981255976
-
SHA1
2fb69cd16f43c981e1fd4d265928d4bf518ae7d2
-
SHA256
5c06b00830e828ac09b88c7afcd94dc5a28b238333400d51af06fda58d99b81d
-
SHA512
79c11ffb7bb9aa87fcebccf8c0a6769d570b0b39b8788f747306b0c91b83d5e7586715efe939b0563a56dddadf5c37438cde6b7165fcbe8085af49c915ea9fa0
-
SSDEEP
3072:XklIl0fRKmQuLz+jQavn5hM3k5+LwdT0V6X7vHrSA54mNY7S7p0ngeAg0Fujow3G:Umlc4/VPvP+L9V2/r8AOR3dLk0RO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 99f900d6050311138fde067981255976_JaffaCakes118
Files
-
99f900d6050311138fde067981255976_JaffaCakes118.dll windows:6 windows x86 arch:x86
1bf0079d6bd8a0ead44e0ad440f0ef33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleFileNameA
VirtualProtect
PeekNamedPipe
GetEnvironmentVariableA
CreateMutexA
GetCurrentDirectoryA
DuplicateHandle
Sleep
OpenMutexA
GetCurrentThread
DeleteFileA
ResetEvent
GetWindowsDirectoryA
FindFirstChangeNotificationA
GetExitCodeProcess
HeapSize
FlushFileBuffers
CreateFileW
GetConsoleCP
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapAlloc
CreateThread
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetStringTypeW
CloseHandle
SetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
FreeLibrary
LoadLibraryExW
ReadFile
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
ExitProcess
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetACP
HeapFree
HeapReAlloc
WriteFile
OutputDebugStringW
SetEndOfFile
user32
TranslateMessage
SetForegroundWindow
UnhookWinEvent
SetWinEventHook
DeferWindowPos
UnregisterHotKey
DestroyWindow
CreateMenu
BeginDeferWindowPos
RegisterWindowMessageA
GetPropA
CheckRadioButton
GetClipboardData
SendDlgItemMessageA
SendMessageA
SetClipboardData
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CLSIDFromString
oleacc
AccessibleObjectFromEvent
WindowFromAccessibleObject
GetOleaccVersionInfo
AccessibleObjectFromWindow
Exports
Exports
Couldmelody
Covertable
Rememberraise
Selfready
Thoughstick
Sections
.text Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ