e:\Mithril v1.33(含原代码)\多线程插入explorer\Mithril v1.40\dllMainMuma2thread\Debug\dllTest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a8d25d794d8f08cd4de0c3d6bf389e6d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8d25d794d8f08cd4de0c3d6bf389e6d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a8d25d794d8f08cd4de0c3d6bf389e6d_JaffaCakes118
-
Size
136KB
-
MD5
a8d25d794d8f08cd4de0c3d6bf389e6d
-
SHA1
f98d70007376a6510eb5c160019bbf1017aceace
-
SHA256
0ddb33e6de550e206cacb241a69cce2a1c73fe9c27b9fedad07dab620c7d7f20
-
SHA512
9442f3c9ed3ff3f1bcf39bf56a6e60ca29dd440dc293661f81ab2d9f665ee95be354c77c8f9b0ed2263697d6b19f630cafa4d5ebaefb7e987009b1e8c1ff358c
-
SSDEEP
3072:x7OmuavmSIy5c0Tbnda5W4TWQDKzS/+hIXlOMiE:x7OyvmSIy5jbda57TDDKM+1Mi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8d25d794d8f08cd4de0c3d6bf389e6d_JaffaCakes118
Files
-
a8d25d794d8f08cd4de0c3d6bf389e6d_JaffaCakes118.dll windows:4 windows x86 arch:x86
b332525678c57bd8e0bedfbb4e38e8c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
CreateThread
WaitForSingleObject
CreateProcessA
Sleep
Process32Next
CompareStringW
CompareStringA
GetLocaleInfoW
SetStdHandle
LCMapStringW
LCMapStringA
OpenProcess
TerminateProcess
Module32First
CloseHandle
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
SetFilePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
FlushFileBuffers
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
DebugBreak
RaiseException
GetProcAddress
LoadLibraryA
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
RtlUnwind
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
SetLastError
GetLastError
GetCurrentThread
ExitProcess
IsBadWritePtr
IsBadReadPtr
HeapValidate
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
UnhandledExceptionFilter
HeapAlloc
GetProcessHeap
FreeLibrary
FatalAppExitA
SetConsoleCtrlHandler
VirtualQuery
InterlockedExchange
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetACP
GetOEMCP
SetEnvironmentVariableA
user32
ExitWindowsEx
SystemParametersInfoA
ClipCursor
SetDoubleClickTime
SwapMouseButton
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
ws2_32
accept
recv
closesocket
listen
bind
htons
WSASocketA
WSAStartup
send
winmm
mciSendStringA
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ