pdb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b57d7f690d0495cd8b2d011256fffb81_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b57d7f690d0495cd8b2d011256fffb81_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b57d7f690d0495cd8b2d011256fffb81_JaffaCakes118
-
Size
72KB
-
MD5
b57d7f690d0495cd8b2d011256fffb81
-
SHA1
21333aa0123caae435663960bd7df12d02b38017
-
SHA256
0c7421b0423e8748874291692a8b13c6c206626623eb2544c09d1e07ff73b916
-
SHA512
a4b2cd7d70dbc7d1b57c68e48759ffb0aef5bfa653d3b6fc7573c52e5312ed69595876a6e97a4a938da9f873bca2a8fa3d26ecbaaabe3813182bfe6ce1d06f2c
-
SSDEEP
1536:54vQ0Pwzf5O4RgR+pjOned7Sba8lYIpNieVe:uvQ0I1O4u+pj0kClNNiB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b57d7f690d0495cd8b2d011256fffb81_JaffaCakes118
Files
-
b57d7f690d0495cd8b2d011256fffb81_JaffaCakes118.dll windows:4 windows x86 arch:x86
b119c80d960d40926dbff2237d8d2451
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
TlsGetValue
lstrcmpA
GetCurrentThreadId
DeleteCriticalSection
GetCurrentProcessId
DisableThreadLibraryCalls
FreeEnvironmentStringsW
GetStdHandle
TlsFree
GetOEMCP
QueryPerformanceCounter
WideCharToMultiByte
LocalAlloc
LCMapStringA
VirtualFree
InterlockedIncrement
MapViewOfFile
LoadLibraryA
HeapReAlloc
GetDiskFreeSpaceA
VirtualProtect
GetFileType
CreateFileMappingW
EnterCriticalSection
CreateMutexW
UnmapViewOfFile
DeleteFileA
InterlockedExchange
GetSystemInfo
SetHandleCount
GetProcAddress
GetTickCount
DeleteFileW
GetVersionExA
CloseHandle
SetFilePointer
SetFileTime
TlsAlloc
IsDBCSLeadByte
WaitForSingleObject
Sleep
GetFullPathNameW
ReleaseMutex
SetLastError
CreateFileW
CompareFileTime
GetLocaleInfoA
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CreateThread
HeapFree
GetDiskFreeSpaceW
HeapDestroy
InterlockedDecrement
GetCPInfo
HeapCreate
GetSystemTimeAsFileTime
SetEndOfFile
CreateFileMappingA
WriteFile
CreateMutexA
FreeEnvironmentStringsA
TerminateProcess
GetStringTypeExA
GetCurrentProcess
UnhandledExceptionFilter
GetLastError
VirtualAlloc
MoveFileA
MoveFileW
FlushViewOfFile
GetACP
SetUnhandledExceptionFilter
FreeLibrary
lstrlenW
GetEnvironmentStrings
HeapAlloc
lstrlenA
GetEnvironmentVariableA
OpenFileMappingA
InitializeCriticalSection
lstrcmpiA
LeaveCriticalSection
CreateEventA
VirtualQuery
GetStringTypeW
GetFullPathNameA
CreateFileA
GetEnvironmentStringsW
GetFileSize
GetStringTypeA
GetStartupInfoA
LocalFree
OpenFileMappingW
IsBadReadPtr
SetEvent
EnumDateFormatsExA
InterlockedCompareExchange
msvcrt
malloc
free
_initterm
_amsg_exit
_adjust_fdiv
_except_handler4_common
_XcptFilter
Exports
Exports
dfjahn
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ