e:\together\Release\rxjh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b2adf2f8a10c95cc22fe8844d35a846e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2adf2f8a10c95cc22fe8844d35a846e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b2adf2f8a10c95cc22fe8844d35a846e_JaffaCakes118
-
Size
64KB
-
MD5
b2adf2f8a10c95cc22fe8844d35a846e
-
SHA1
0f616c20453c7dffaa284171c55b9c498b57c49c
-
SHA256
1145ff53f8726a2a148c3bf7638d6738cb22d99e7f07fc222a6dcfd1c687b140
-
SHA512
7407ad6757fa1f516c1c7a621ba41a2d50279ad3eb472162b3bc40fbc358e03ded8486f42cda4d5324036e929bbc148b473711d7b53bd6fc14ec83f209008b7b
-
SSDEEP
1536:z4rOtDrd6TSZ5c6y69k/HVLp6ip/FJ/D0:GOtDrUeZ5Ql//FJ/D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2adf2f8a10c95cc22fe8844d35a846e_JaffaCakes118
Files
-
b2adf2f8a10c95cc22fe8844d35a846e_JaffaCakes118.dll windows:4 windows x86 arch:x86
40a6f1f6e5795ad64aa5614362a77c7f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualProtect
VirtualQuery
GetProcAddress
GetModuleHandleA
LoadLibraryA
CloseHandle
CreateThread
WriteProcessMemory
VirtualProtectEx
OpenProcess
GetCurrentProcessId
GetSystemInfo
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
HeapSize
SetStdHandle
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetModuleFileNameA
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
RtlUnwind
InterlockedExchange
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
HeapReAlloc
user32
ToAsciiEx
SetWindowsHookExA
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
wininet
InternetReadFile
InternetCloseHandle
HttpSendRequestA
HttpAddRequestHeadersA
InternetOpenA
InternetConnectA
HttpOpenRequestA
imagehlp
ImageDirectoryEntryToData
ws2_32
inet_ntoa
WSARecv
inet_addr
ntohl
connect
recv
send
Exports
Exports
InstallHook
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ