c:\Users\Administrator\Desktop\NoName's Hook\Debug\Menu Fix 1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
be4d7940a9a0ebfb0975f1d3ad1ec4d2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be4d7940a9a0ebfb0975f1d3ad1ec4d2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
be4d7940a9a0ebfb0975f1d3ad1ec4d2_JaffaCakes118
-
Size
504KB
-
MD5
be4d7940a9a0ebfb0975f1d3ad1ec4d2
-
SHA1
1dc89d10f4fc1a320561852d0fec891360d1b5ef
-
SHA256
75d028b8eacaf2c223b5c6ad40319e828d69020a79da54555c29c15ea6177000
-
SHA512
8c99b55e2a7d5797fd958d70673ec2d9a5a8b549aca4ef926dccb212f54ef74553e30bdd55a95cf5c6f22139100b1ad154eb3b4d4609401572d9c8a07cdc80ab
-
SSDEEP
6144:FQ2Xb5BjsSkPKTgmYffzcxvuPA1VrNF/SLRrNqwZvQYuhsPecn4Z:FH5BjsSkPPmYffzcxvuILHKL9ZvahA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be4d7940a9a0ebfb0975f1d3ad1ec4d2_JaffaCakes118
Files
-
be4d7940a9a0ebfb0975f1d3ad1ec4d2_JaffaCakes118.dll windows:5 windows x86 arch:x86
8dbd3585410ed5263eec52853c1ec6df
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FlushFileBuffers
CompareStringA
CompareStringW
MulDiv
DisableThreadLibraryCalls
CreateThread
LoadLibraryA
Sleep
GetModuleHandleA
VirtualProtect
RtlUnwind
RaiseException
GetCurrentThreadId
GetCommandLineA
HeapValidate
IsBadReadPtr
IsDebuggerPresent
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetModuleFileNameW
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcessHeap
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
WriteFile
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
InterlockedExchange
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetLocaleInfoW
GetTimeZoneInformation
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
SetEnvironmentVariableA
user32
GetAsyncKeyState
GetSystemMetrics
gdi32
DeleteObject
CreateCompatibleDC
CreateDIBSection
SetMapMode
GetDeviceCaps
CreateFontA
SelectObject
SetTextColor
SetBkColor
SetTextAlign
GetTextExtentPoint32A
DeleteDC
ExtTextOutA
Sections
.textbss Size: - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 399KB - Virtual size: 399KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ