d:\传奇木马\TestAppInit\Release\TestAppInit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b8bfd9a6f55fa0a2a637252c1ef088b1_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8bfd9a6f55fa0a2a637252c1ef088b1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b8bfd9a6f55fa0a2a637252c1ef088b1_JaffaCakes118
-
Size
60KB
-
MD5
b8bfd9a6f55fa0a2a637252c1ef088b1
-
SHA1
e577f81b7a9bab5c3ffb6835e55e56b561d8241c
-
SHA256
1de8e022221bbe93ea4abfddd828cf1c91e507f7daf4f4c27e0ce69d50c80e93
-
SHA512
26a1add2d246551a46d74fded2767615dbd9de4ebf774612ee980d39b0728e0626f5154824bb092743c5303ee133be0fed7242493a1ab67846a4ed54bb358e92
-
SSDEEP
768:AQyWRElZ5FTyPL475rKvznUlCawb4OT4pISNi7etlDbRjD:dElZ5cPL4752znUlCaw0O8NzzDbRj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8bfd9a6f55fa0a2a637252c1ef088b1_JaffaCakes118
Files
-
b8bfd9a6f55fa0a2a637252c1ef088b1_JaffaCakes118.dll windows:4 windows x86 arch:x86
5d41e6ca51efdb544b5343797e737c57
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleFileNameA
GlobalFree
WriteFile
CreateFileA
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
WinExec
lstrcmpA
ReadFile
OutputDebugStringA
GetLastError
lstrcatA
GetWindowsDirectoryA
GetProcAddress
lstrcpynA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
Sleep
OpenFile
DeleteFileA
GetCurrentProcess
GetSystemDirectoryA
TerminateProcess
OpenProcess
GetCurrentProcessId
CreateThread
GetSystemInfo
VirtualProtect
lstrlenA
CompareStringA
CreateToolhelp32Snapshot
Process32First
Module32First
Module32Next
CloseHandle
LoadLibraryA
Process32Next
ExitProcess
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InterlockedExchange
VirtualQuery
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
user32
PostMessageA
MessageBoxA
GetWindowTextA
advapi32
RegRestoreKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSaveKeyA
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ