c:\JobState\roomConsonant\EatBall\Nor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a4fac616a87e9b6a069d06bfc41e8dce_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
a4fac616a87e9b6a069d06bfc41e8dce_JaffaCakes118
-
Size
920KB
-
MD5
a4fac616a87e9b6a069d06bfc41e8dce
-
SHA1
7539824aa549a6c1abdad3e4c96ea2184f654877
-
SHA256
ac152e73957a8cb702eb7f18bb38e2bf92e4702e108ac71d403b829600b2029f
-
SHA512
5fe79324231a84ba6497fa61c6a14b70b3b8073071e807e09f5d98089c1693b066953d2f26b385d59e78554d55e8ce7c05f875aacebacb3c434ed4850e9d374c
-
SSDEEP
24576:s8WfnaVoffEQmyO378WTkvEKT9Hgce1BHbogCm:/uaq34yDWTkvvT9HgdbogC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4fac616a87e9b6a069d06bfc41e8dce_JaffaCakes118
Files
-
a4fac616a87e9b6a069d06bfc41e8dce_JaffaCakes118.dll windows:6 windows x86 arch:x86
2b5af016caf77cb8f1d9180b332d8806
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
OpenProcessToken
OpenThreadToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupPrivilegeValueW
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
QueryServiceStatus
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
SetEntriesInAclA
kernel32
HeapSize
SetFilePointerEx
GetFileSizeEx
SetStdHandle
GetLastError
GetConsoleCP
WriteFile
FlushFileBuffers
GetProcessHeap
WriteConsoleW
DeleteFileA
CreateFileA
GetCurrentDirectoryA
GetStartupInfoA
CreateProcessA
GetModuleFileNameA
DeleteCriticalSection
LoadLibraryA
OpenMutexA
GetTickCount
CreateFileW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapReAlloc
HeapAlloc
GetLocalTime
CloseHandle
GetFileTime
GetFileSize
Sleep
GetCurrentProcessId
VirtualProtect
GetProcAddress
FreeLibrary
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
GetCPInfo
WideCharToMultiByte
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
SetEvent
ResetEvent
WaitForSingleObjectEx
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
InterlockedFlushSList
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapFree
user32
GetClassNameA
CheckMenuRadioItem
SystemParametersInfoA
IsWindowEnabled
FrameRect
DispatchMessageA
RegisterClassExA
LoadImageA
DrawIcon
GetWindowTextLengthA
ClientToScreen
ScreenToClient
gdi32
SetAbortProc
AbortDoc
EndDoc
SetRectRgn
SelectClipRgn
PtVisible
GetStockObject
GetPixel
CreateRectRgn
CreateFontA
CombineRgn
GetTextMetricsA
ole32
CoInitialize
OleInitialize
CoUninitialize
OleUninitialize
OleSetContainedObject
CoCreateInstance
ws2_32
WSAStartup
WSAConnect
WSACleanup
WSASocketA
shlwapi
PathFindFileNameA
SHSetValueA
StrChrA
winspool.drv
GetPrinterA
DocumentPropertiesA
DeletePrinterConnectionA
ClosePrinter
OpenPrinterA
comdlg32
CommDlgExtendedError
ChooseFontA
ReplaceTextA
GetSaveFileNameA
GetOpenFileNameA
comctl32
ImageList_DragMove
ImageList_DragEnter
ImageList_ReplaceIcon
ImageList_DragShowNolock
Sections
.text Size: 628KB - Virtual size: 628KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ