d:\Visual Studio 2008\Projects\Modern Warfare\Release\Modern Warfare Public.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bd34e6a39913b81eb08a73ef68edbb09_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd34e6a39913b81eb08a73ef68edbb09_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bd34e6a39913b81eb08a73ef68edbb09_JaffaCakes118
-
Size
39KB
-
MD5
bd34e6a39913b81eb08a73ef68edbb09
-
SHA1
802b76c854fd096ce33dc4e81da47c39ca6e04a9
-
SHA256
b291a7c722b3cc8ab21b7a466040b403571cc54e79c7086ebe1d64e3200bc887
-
SHA512
db32580f7286395408c4230454a29ef45fc47a56225674110153e8a0435c63997581573c31c5ae0a48c363b9b2775457d98e499cc5573960dffc59c680be2565
-
SSDEEP
768:gpgBmNvl/C8KQExNG6qEl+BUrsFOXnAA0kLAADlOtao7CEYm:/BmX/C8gN5qElfrsFOXnA2XlOtaolYm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd34e6a39913b81eb08a73ef68edbb09_JaffaCakes118
Files
-
bd34e6a39913b81eb08a73ef68edbb09_JaffaCakes118.dll windows:5 windows x86 arch:x86
98a005f84ee1e57832ab4f74337e328a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTickCount
GetModuleFileNameA
EncodeSystemPointer
ReadProcessMemory
Sleep
SetLastError
Module32Next
CreateThread
GetCurrentProcess
FlushInstructionCache
VirtualProtect
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
GetAsyncKeyState
MessageBoxA
msvcp90
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
winmm
PlaySoundA
msvcr90
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
memcpy
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_malloc_crt
free
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__clean_type_info_names_internal
?what@exception@std@@UBEPBDXZ
_vsnprintf
vsprintf_s
_wassert
__CxxFrameHandler3
_invalid_parameter_noinfo
_CItan
_CIsqrt
_CIasin
_CxxThrowException
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ