d:\_SourceRoot\Products\WinLine\WinFirewall2005\IdleUI\Release_Winline 2005\IdleUI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a15d75d5035978028d773bc629ed9dc8_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a15d75d5035978028d773bc629ed9dc8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a15d75d5035978028d773bc629ed9dc8_JaffaCakes118
-
Size
10KB
-
MD5
a15d75d5035978028d773bc629ed9dc8
-
SHA1
a8acaadc25c4fcb0402c093611e0e06bf39912f5
-
SHA256
2efdffd078f5fe818b64f6b9ae3a3962f3d152953e7b824bf632707f5289b13e
-
SHA512
bb699404681f0a4e336ccccd35416cb746ed92c78a8c138dd03b938cd611f932446e9a33371c2d9d5e3a05388d072e3a0987ca7e83d8352c0133c38102d6b01c
-
SSDEEP
192:xvs4gE646rl+FHeOvVHrBtDhrZIRRsty:Zs4gbtW3Bt9ZcRF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a15d75d5035978028d773bc629ed9dc8_JaffaCakes118
Files
-
a15d75d5035978028d773bc629ed9dc8_JaffaCakes118.dll windows:4 windows x86 arch:x86
d10d229d69f43ea54636952784ab431e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfc71
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord757
ord764
ord4014
ord765
ord315
ord1037
ord1206
ord1208
ord1098
ord371
ord1120
ord1201
ord1175
ord1177
ord314
ord1209
ord1084
ord1092
ord1167
ord3709
ord3719
ord3718
ord2990
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord3830
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord581
ord4038
msvcr71
malloc
free
_except_handler3
__CxxFrameHandler
??2@YAPAXI@Z
memset
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__CppXcptFilter
_adjust_fdiv
_initterm
__security_error_handler
_onexit
__dllonexit
kernel32
WaitForSingleObject
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
ExitProcess
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
LocalFree
GetVersionExA
CloseHandle
OutputDebugStringA
CreateEventA
SetEvent
GetTickCount
ResetEvent
user32
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
Exports
Exports
?IdleUIGetLastInputTime@@YAKXZ
?IdleUIInit@@YAHXZ
?IdleUIScreenSvrStarted@@YAHXZ
?IdleUITerm@@YAXXZ
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.IdleUI Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ