F:\odin\miniloader\build\release\obj\src\main\miniloader-patchdate-stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a76d0d9c6ddb1f421a2cc1c4385a7185_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a76d0d9c6ddb1f421a2cc1c4385a7185_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a76d0d9c6ddb1f421a2cc1c4385a7185_JaffaCakes118
-
Size
72KB
-
MD5
a76d0d9c6ddb1f421a2cc1c4385a7185
-
SHA1
3de6d5852f2d452a3fd0f9ce188b89077fb0d044
-
SHA256
243df2be039f1fad79a0f89731e10af3b526f3630171c6cd792a868619770dd0
-
SHA512
5d3efe573aa5e6e6daa8bb76c1fe21e350ba3bc0c016a9832fd3f237949f08dd22b497aa738e4de9a92ab83e88436cb0c1030703d22331cf16c815df01eda32c
-
SSDEEP
768:yrhgEktIZRqD0nIZTDQZu50mMCnql61UF0Xb5ffPbbcAmCepStxuH8iakl7wEjrR:yrhUrD0nCX50m7KKbJPGpMDiwy8Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a76d0d9c6ddb1f421a2cc1c4385a7185_JaffaCakes118
Files
-
a76d0d9c6ddb1f421a2cc1c4385a7185_JaffaCakes118.dll windows:4 windows x86 arch:x86
4472e0337b847b0e7e35ece5f28d94d5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ExitProcess
Beep
SetLocalTime
GetLocalTime
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CreateFileW
ReadFile
CreatePipe
CreateFileA
UnlockFile
LockFile
ReadConsoleInputW
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
PeekNamedPipe
GetFileInformationByHandle
DuplicateHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
ReadConsoleW
GetConsoleCP
IsDBCSLeadByteEx
GetConsoleMode
SetConsoleMode
ReadConsoleA
HeapWalk
HeapCompact
HeapValidate
CreateProcessW
CreateProcessA
FreeLibrary
WaitForSingleObject
GetExitCodeProcess
IsBadCodePtr
SetUnhandledExceptionFilter
IsBadReadPtr
RaiseException
MoveFileA
GetDriveTypeW
RemoveDirectoryW
MoveFileW
DeleteFileW
CreateDirectoryW
GetFullPathNameW
SetFileAttributesW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFileAttributesW
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetDriveTypeA
GetFullPathNameA
SetFileAttributesA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFileAttributesA
SetErrorMode
GetLogicalDrives
GetDiskFreeSpaceA
FileTimeToLocalFileTime
FileTimeToSystemTime
Sleep
CompareStringW
CompareStringA
SetStdHandle
SetFilePointer
FlushFileBuffers
GetSystemInfo
VirtualProtect
HeapSize
GetTimeZoneInformation
GetDateFormatA
GetTimeFormatA
GetLocaleInfoW
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetEnvironmentVariableW
SetEnvironmentVariableA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualQuery
InterlockedExchange
SetConsoleCtrlHandler
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
RtlUnwind
InitializeCriticalSection
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCommandLineW
MultiByteToWideChar
LoadLibraryA
GetCPInfo
GetOEMCP
GetACP
GetStartupInfoA
GetFileType
SetHandleCount
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapFree
HeapAlloc
FindFirstFileW
FindNextFileW
FindClose
FindFirstFileA
FindNextFileA
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
SetLastError
TlsAlloc
CreateThread
ResumeThread
GetLastError
CloseHandle
ExitThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetVersionExA
GetCommandLineA
GetCurrentThreadId
GetStdHandle
WriteFile
GetCurrentProcess
TerminateProcess
GetModuleHandleA
GetProcAddress
GetModuleFileNameW
GetModuleFileNameA
GetProcessHeap
MoveFileWithProgressA
Exports
Exports
njuepxb
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 670B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ