C:\Users\Gebruiker\Documents\Visual Studio 2017\Projects\WARFACE cheats\N1ceBase\Release\DirectEngine.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JTfZKrA70s0qc0bTsUsCgOBa1N1EPUt.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JTfZKrA70s0qc0bTsUsCgOBa1N1EPUt.dll
Resource
win10v2004-20240802-en
General
-
Target
c07fd8c30ec97511f0bddaab1624efc2_JaffaCakes118
-
Size
10KB
-
MD5
c07fd8c30ec97511f0bddaab1624efc2
-
SHA1
d7bacceadd46e7f455eb7916a77294756dd66596
-
SHA256
3636d3fa7533c432d48c74fb70c7f67597b43b4eb13e33421634be4874a2fd79
-
SHA512
8e3b709e832ef6284342e15468dcb1b097f34104605f72eb67d0ff59ff3a0e4d4c19f60ac4f0af10122715853e7a0b75531eb210219fbc43ab0dd18fd67dafb6
-
SSDEEP
192:IiLFq0YAc9y60u4831dh9N4axZKlWsFJEd1p3Lfs+XQ+Mh3RNUahVdCR4/5qRR1O:IiLI0YA+c83hz4WGFulsWTMhxdCR25AG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/JTfZKrA70s0qc0bTsUsCgOBa1N1EPUt.dll
Files
-
c07fd8c30ec97511f0bddaab1624efc2_JaffaCakes118.rar
-
JTfZKrA70s0qc0bTsUsCgOBa1N1EPUt.dll.dll windows:6 windows x86 arch:x86
71854c3b3753240625a346509cd56b46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualProtect
GetCurrentProcess
ExitThread
GetModuleHandleA
Sleep
DisableThreadLibraryCalls
LoadLibraryA
CreateThread
FlushInstructionCache
GetTickCount
VirtualQuery
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
user32
ScreenToClient
GetCursorPos
GetForegroundWindow
GetAsyncKeyState
CreateWindowExA
SetRect
GetDesktopWindow
GetKeyState
DestroyWindow
RegisterClassExA
DefWindowProcA
d3d9
Direct3DCreate9
d3dx9_43
D3DXCreateLine
D3DXCreateFontA
vcruntime140
__std_type_info_destroy_list
memcpy
_except_handler4_common
__std_exception_copy
memset
_CxxThrowException
__std_exception_destroy
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_cexit
_initialize_narrow_environment
_execute_onexit_table
_configure_narrow_argv
_initterm
_seh_filter_dll
_initterm_e
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Прочти меня.txt