rhecuva.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ba9c3c2681a194c3dacce2875db38dcd_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ba9c3c2681a194c3dacce2875db38dcd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ba9c3c2681a194c3dacce2875db38dcd_JaffaCakes118
-
Size
49KB
-
MD5
ba9c3c2681a194c3dacce2875db38dcd
-
SHA1
4bc57cd3c6a6b94bc8072dd83b2b37134f723f84
-
SHA256
f982ad1bcbf69c66ab78182e92ce23a871ff1c9ca464f8ccc373cdbcaa8b6899
-
SHA512
d0bf874f9c72426ee80b0284e981236757c2b06b75d3feb9f1fb2163834c891eabf48244aa56fad02c65cce8340dad5e63cb44eb3d3ab62ad71cf07807e006c9
-
SSDEEP
768:N2LScpjVW4bFZ4AJTAn77xWU5DLQLm9a1QMPVzAQMz0:N6Jl4mTw7758LgZIBAQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba9c3c2681a194c3dacce2875db38dcd_JaffaCakes118
Files
-
ba9c3c2681a194c3dacce2875db38dcd_JaffaCakes118.dll windows:4 windows x86 arch:x86
4eaa6a39019fdde8ba1831059dc3318b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FreeLibrary
LoadLibraryW
InterlockedIncrement
InterlockedDecrement
lstrcpyW
CloseHandle
MulDiv
SetEvent
MultiByteToWideChar
GetCurrentThreadId
GetProcAddress
GlobalAlloc
LoadLibraryA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateEventW
GetTickCount
GetTempPathW
GetTempFileNameW
CopyFileW
ReadFile
GetFileAttributesW
CreateFileW
WriteFile
GlobalFree
DeleteFileW
ResetEvent
GetLocalTime
lstrcatW
GetUserDefaultLCID
GetCurrentDirectoryW
FormatMessageW
LocalFree
lstrcmpW
GetModuleHandleA
QueryPerformanceCounter
lstrlenW
advapi32
IsValidSid
msvcrt
exit
Exports
Exports
yhrf
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ