C:\Users\RiSk\Desktop\готовый исходник - копия\Release\MultiHack.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b8dc73b25037bbaf65d881acce92d7e4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8dc73b25037bbaf65d881acce92d7e4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b8dc73b25037bbaf65d881acce92d7e4_JaffaCakes118
-
Size
117KB
-
MD5
b8dc73b25037bbaf65d881acce92d7e4
-
SHA1
f5316fdda4daa26da9a79155507b06db1c3df31f
-
SHA256
d36ae2419c883179682c8fbec27e16c274900a095a17dab4298f6822fef8f58b
-
SHA512
7a92d0cc30fcbeb62313b77b3739d720116e58b6f6b10bab3f2d2bd9b2c2e05529738f0bd964f51478627252b56ac93772f9039ab899d494ab5465bed321766e
-
SSDEEP
3072:qszmDZHRdK1BniNpbxVsjJZmsb+a7mIiVBD/cuyP+XK:FmDZTKmDMMcl+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8dc73b25037bbaf65d881acce92d7e4_JaffaCakes118
Files
-
b8dc73b25037bbaf65d881acce92d7e4_JaffaCakes118.dll windows:5 windows x86 arch:x86
facfe26c616cf85f2decbbe6ef75a50c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ExitProcess
GetCurrentProcess
Sleep
ReadProcessMemory
ExitThread
LoadLibraryA
GetModuleHandleA
VirtualProtect
CreateThread
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
IsProcessorFeaturePresent
user32
mouse_event
SetRect
MessageBeep
GetAsyncKeyState
GetCursorPos
d3dx9_41
D3DXCreateFontA
D3DXCreateSprite
D3DXCreateTextureFromFileInMemoryEx
msvcr100
??2@YAPAXI@Z
_malloc_crt
free
clock
_initterm
_initterm_e
_amsg_exit
__CppXcptFilter
_crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
system
malloc
sprintf
memset
memcpy
_encoded_null
Sections
_TEXT Size: 512B - Virtual size: 431B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ