c:\Build\DummyDLLs\DummyXMLParse\Release\DummyXMLParse.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ad74a9870f72e17d28b1bb8746794a6c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad74a9870f72e17d28b1bb8746794a6c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ad74a9870f72e17d28b1bb8746794a6c_JaffaCakes118
-
Size
33KB
-
MD5
ad74a9870f72e17d28b1bb8746794a6c
-
SHA1
84c766596a261bdaf6c1bfe3b2110e9736e5dbec
-
SHA256
6874a6f4bb548e6e41881b7b065fdb228bd3a3f5a9120f9e84330f102ad6dcaf
-
SHA512
1ec8eb53c1327b3c03384d821fc95cd7aa8e52fd4dacabc65791da6d216b576ffb3c0571274a8929c14224015c3ccbe3cc83d28b66cde2e995286a9e17db0e33
-
SSDEEP
384:Wj2IlDaxOndJKtj7NXwJX2vZR0bbKoEn2aLVWmGP9nrR415FuRbrZrvADYs:Wjbh0L8lHKoEn2aLEmGlnrq/2rYDYs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad74a9870f72e17d28b1bb8746794a6c_JaffaCakes118
Files
-
ad74a9870f72e17d28b1bb8746794a6c_JaffaCakes118.dll windows:4 windows x86 arch:x86
b15f50e3f2711e0feb9b6d0b6f0258b5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThreadId
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualProtect
GetSystemInfo
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ