D:\01 - MuFun\1-DLL\1-New\PluginS16 - Copia (2)\Debug\Plugin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a5d5da32aa5ce13b91555b7ba4120ae7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5d5da32aa5ce13b91555b7ba4120ae7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a5d5da32aa5ce13b91555b7ba4120ae7_JaffaCakes118
-
Size
458KB
-
MD5
a5d5da32aa5ce13b91555b7ba4120ae7
-
SHA1
936487532ee11e7ad3e4c83c0ea0911edc571040
-
SHA256
0d2c57883a575a69d25765040dd1589fdf39de63e8a899324e16aa99f4190e55
-
SHA512
aa2dac61eff7567605c7f657716c5865556ae5b4fbbb5125306ba26766ebe80375f84131c2d02024851d4f87e7cf73a9e1f7a51478512fe07222919499a5b51d
-
SSDEEP
3072:07MxZqSobFirgP7y2by5bcctUgGJSxRZK9IXZIh/OvQtuZMOl6z9B+iBEWs3cuJs:oFirmG2uESxRqk6h/wP6z9B+zWo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5d5da32aa5ce13b91555b7ba4120ae7_JaffaCakes118
Files
-
a5d5da32aa5ce13b91555b7ba4120ae7_JaffaCakes118.dll windows:5 windows x86 arch:x86
c64581f9bcc484a4c4572f215c214410
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateThread
SetThreadPriority
WaitForMultipleObjects
InitializeCriticalSection
DeleteCriticalSection
GetTickCount
GetCurrentProcessId
VirtualProtect
GetLastError
Sleep
GetCurrentThreadId
GetLogicalDriveStringsW
QueryDosDeviceW
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
ReadFile
SetEndOfFile
GetStringTypeW
LCMapStringW
HeapAlloc
GetProcessHeap
GetCurrentProcess
HeapFree
EncodePointer
DecodePointer
GetCommandLineA
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
RtlUnwind
CloseHandle
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
SetHandleCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
CompareStringW
MultiByteToWideChar
SetEnvironmentVariableA
CreateFileA
SetStdHandle
FlushFileBuffers
CreateFileW
WriteConsoleW
IsValidLocale
user32
GetWindowRect
SetWindowTextA
SetWindowsHookExA
GetForegroundWindow
CallNextHookEx
wsprintfA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
Exports
Exports
EntryProc
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ