C:\Users\-Away\Desktop\Machida Projects\Zombie Hack 2\Simple Hack before the Beast\Debug\Simple Hack before the Beast.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b409d9ba357edf46a299d632e4a2ffd8_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b409d9ba357edf46a299d632e4a2ffd8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b409d9ba357edf46a299d632e4a2ffd8_JaffaCakes118
-
Size
28KB
-
MD5
b409d9ba357edf46a299d632e4a2ffd8
-
SHA1
f0899bec32d09d644b2a961ca12ac2162979d982
-
SHA256
3a81b29266e6f501bcf50ee54dc2ed5c4247855735005aff211c6fafb0e4b807
-
SHA512
e5f5bbf9357dd5071aafff9567ffb0ea65f70405430382fdd39147c11c39ede0be3a079570f9cb54e2e31ad99c5374f55abceb490a9de0a34087d8b439c928d7
-
SSDEEP
384:f5HHvmeTBhsJctSHzVZd26awz+O/TVPywUbKOlQlEnr1PGiyqZma:f5+eTBhsJkSTV3JlLVJUxKs1+iyqZm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b409d9ba357edf46a299d632e4a2ffd8_JaffaCakes118
Files
-
b409d9ba357edf46a299d632e4a2ffd8_JaffaCakes118.dll windows:5 windows x86 arch:x86
26cfcf40b6bfe12cd33c94c9bd531305
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleHandleA
Sleep
DisableThreadLibraryCalls
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
FreeLibrary
VirtualQuery
GetModuleFileNameW
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
LoadLibraryW
GetProcAddress
lstrlenA
RaiseException
MultiByteToWideChar
IsDebuggerPresent
WideCharToMultiByte
InterlockedCompareExchange
SetUnhandledExceptionFilter
EncodePointer
DecodePointer
InterlockedExchange
user32
SetTimer
GetAsyncKeyState
FindWindowA
msvcr100d
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_CrtSetCheckCount
_encoded_null
_free_dbg
_malloc_dbg
_CRT_RTC_INITW
system
memcpy
_crt_debugger_hook
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ