d:\projects\egold\Release\dll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a592964791f72e5fbef11c2166a3c3fc_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a592964791f72e5fbef11c2166a3c3fc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a592964791f72e5fbef11c2166a3c3fc_JaffaCakes118
-
Size
96KB
-
MD5
a592964791f72e5fbef11c2166a3c3fc
-
SHA1
39daae11c52c0c904ab891c4f9286e06f2d45ba0
-
SHA256
0db733cd8fee6ec9ddbb4d3c2b440c33ce480557527f8c46bdc5d7322fdd45c3
-
SHA512
eff1083b6b2000525ccfe303930b3818edc26a6e7d64704eb946c22094974b7fa8528eb16aa0125d6710636b7aec49af70b0e476dba7761569d4f1ef4ba82ee7
-
SSDEEP
1536:tjxqSWBS1jFNWnO9J2/y26n/Le7GttjhUS:tjFSSxOCJ2c/LsKtjJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a592964791f72e5fbef11c2166a3c3fc_JaffaCakes118
Files
-
a592964791f72e5fbef11c2166a3c3fc_JaffaCakes118.dll windows:4 windows x86 arch:x86
7a2e683e5279ba45ce943d1b8823e936
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
urlmon
URLDownloadToCacheFileW
kernel32
DeleteFileW
CloseHandle
ReadFile
CreateFileW
lstrcpyA
CreateThread
RaiseException
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
lstrlenW
FreeLibrary
SizeofResource
LoadLibraryExW
GetModuleHandleW
GetOEMCP
GetCPInfo
LoadLibraryA
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
GetLastError
GetModuleFileNameW
GetStringTypeA
LCMapStringW
LCMapStringA
GetStringTypeW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetProcessHeap
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WriteFile
GetStdHandle
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
ExitProcess
Sleep
user32
CharNextW
SetWindowsHookExW
SendMessageW
DestroyWindow
UnhookWindowsHookEx
wsprintfW
ShowWindow
SetForegroundWindow
CallNextHookEx
UnregisterClassA
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
ole32
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoCreateInstance
oleaut32
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
shlwapi
StrStrIA
StrCmpW
StrCmpIW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.common Size: 4KB - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ