e:\120111_134428_build_ZeeDip_ZeeDip_1.0.4.0\source\source_sa\bin\Release\ClientSAHook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a1b27dcb67560e4ee1c5294605709970_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a1b27dcb67560e4ee1c5294605709970_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a1b27dcb67560e4ee1c5294605709970_JaffaCakes118
-
Size
139KB
-
MD5
a1b27dcb67560e4ee1c5294605709970
-
SHA1
cf479399b22df11765327a0f9b4fe20d219bb2c8
-
SHA256
450d19a5d9d8ee04e4fbf68cee667839a333df72786b204d950896cbab8b1d26
-
SHA512
13e8c82403e727055596841bcf3c2ae62fed9274587af34c1241420e67903ca3166a8d4d0dce3c10930ced3d2968fd740b52c15fc3565070ba68a0817cd04a15
-
SSDEEP
3072:OdaI7Bi2qE7xJ3RV/T1+Q0cjpcw+/tFTH8htRtPdokK:qagBi2P7xVRN1Ac9cTwP6L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1b27dcb67560e4ee1c5294605709970_JaffaCakes118
Files
-
a1b27dcb67560e4ee1c5294605709970_JaffaCakes118.dll windows:5 windows x86 arch:x86
9e50d8a875498cb9d27b6ba2dcb86947
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
GetModuleFileNameA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
IsBadStringPtrA
GetTickCount
GetCurrentThreadId
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcpyA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetFileAttributesW
GetVersion
FreeLibrary
LoadLibraryW
SetLastError
GetModuleFileNameW
OutputDebugStringA
LoadLibraryA
GetSystemTime
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
Sleep
RtlUnwind
SetStdHandle
GetLastError
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
WriteFile
LCMapStringW
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
EncodePointer
DecodePointer
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
InitializeCriticalSectionAndSpinCount
WriteConsoleW
CreateFileW
OpenProcess
CloseHandle
WideCharToMultiByte
IsBadReadPtr
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
RaiseException
ExitProcess
GetCurrentProcessId
GetStringTypeW
FlushFileBuffers
user32
PtInRect
LoadCursorA
SetRectEmpty
GetClassLongA
SetClassLongA
GetDC
ReleaseDC
GetSysColorBrush
FillRect
GetSysColor
DrawTextA
CopyRect
SendMessageA
GetForegroundWindow
DestroyWindow
CreateWindowExA
GetClassInfoExA
RegisterClassExA
ScreenToClient
DefWindowProcA
EqualRect
SetRect
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
EnumWindows
FindWindowA
SystemParametersInfoA
CallNextHookEx
ShowWindow
GetCursorPos
WindowFromPoint
SetForegroundWindow
SetPropA
RemovePropA
PostMessageA
SetTimer
KillTimer
SetWindowsHookExA
UnhookWindowsHookEx
GetWindow
GetWindowThreadProcessId
GetParent
GetWindowLongA
EnumChildWindows
GetWindowTextA
GetClassNameA
IsWindowEnabled
FindWindowExA
SendMessageTimeoutA
GetPropA
GetAncestor
IsWindow
IsWindowVisible
GetWindowRect
GetSystemMetrics
GetClientRect
gdi32
CreateCompatibleBitmap
SelectObject
SetTextColor
SetBkMode
GetTextExtentPoint32A
BitBlt
DeleteDC
CreateFontIndirectA
GetStockObject
DeleteObject
CreateCompatibleDC
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ole32
CoDisconnectObject
CoCreateInstance
oleaut32
VariantClear
VariantCopy
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocString
psapi
EnumProcessModules
GetModuleFileNameExA
Exports
Exports
GetNCMYBFileVersion
GetNCMYBFileVersionMajor
GetNCMYBFileVersionMinor
HookUp
HookUp2
Unhook
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SHARDAT Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ