c:\late\Prove\ran\busy\operate\Pass\womanEspecially.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bf3a99e8af84252c0a4ef7b7329ad5c2_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
bf3a99e8af84252c0a4ef7b7329ad5c2_JaffaCakes118
-
Size
971KB
-
MD5
bf3a99e8af84252c0a4ef7b7329ad5c2
-
SHA1
744072289b54634dd57893b9cf63f65da3538f4b
-
SHA256
f231656814045ff0ab67fd2b8b1b49ef9c624ed7d2d14de744c1c96241371b4c
-
SHA512
9a2218a8739db8123802452ceed34705393cc6d6565aa199b16f270ad73eff8a28180b3589e1e6f8fe154bf1c167cac97d87c6a88c222be7f0a28553bc741ac0
-
SSDEEP
24576:dGlkSyXOKByXVHmuUAQrFZ5J5EdGKUAGPatVWZ:oyeKByF5U9FZ5J53atVWZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf3a99e8af84252c0a4ef7b7329ad5c2_JaffaCakes118
Files
-
bf3a99e8af84252c0a4ef7b7329ad5c2_JaffaCakes118.dll windows:5 windows x86 arch:x86
5b6e5b7469bbd540d936e79c1e1ec4b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
CreateFileW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
IsProcessorFeaturePresent
LCMapStringW
OutputDebugStringW
WriteConsoleW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
GetVersion
TlsAlloc
VirtualProtect
DeviceIoControl
RemoveDirectoryA
LoadLibraryA
FileTimeToSystemTime
CreateEventA
Sleep
GetWindowsDirectoryA
WaitForSingleObject
OutputDebugStringA
TlsGetValue
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TlsSetValue
TlsFree
GetProcAddress
GetModuleHandleW
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapValidate
IsBadReadPtr
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetModuleFileNameW
RtlUnwind
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
WriteFile
FlushFileBuffers
user32
EmptyClipboard
ValidateRect
DestroyMenu
MapWindowPoints
LoadBitmapA
BeginPaint
GetIconInfo
SetWindowTextA
InvalidateRect
IsDialogMessageA
SendMessageTimeoutA
CheckDlgButton
PostMessageA
GetSystemMetrics
ole32
CoCreateInstance
CoUninitialize
CLSIDFromString
CoInitialize
shlwapi
PathGetArgsA
comdlg32
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
ChooseFontA
CommDlgExtendedError
comctl32
ImageList_Remove
InitCommonControlsEx
ImageList_SetBkColor
ImageList_SetIconSize
ImageList_Destroy
ImageList_SetDragCursorImage
Exports
Exports
Brancheye
Sections
.text Size: 724KB - Virtual size: 723KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 9.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ