E:\P4P\DHT+P4P+NAT_PPLive_work\kade-dll\Release\kademlia.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c837f20f5936507f93bc9400795b7011_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c837f20f5936507f93bc9400795b7011_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c837f20f5936507f93bc9400795b7011_JaffaCakes118
-
Size
427KB
-
MD5
c837f20f5936507f93bc9400795b7011
-
SHA1
909095d911363f621bf993bd270211432ce7d451
-
SHA256
c16424ec1fb0e59dd0547625ed8b4a700a37f0c697fdb580eff87b89524323ac
-
SHA512
79684715d719768fbbeccd5f542ddc5c5b73bd75cc361646c55509dcbb2e4b089f194fec0e5ea2a48bd2de94b728eefcb60ff1db9c5fac14a0fd36c73e66efba
-
SSDEEP
6144:bbikZ43VWMzHhnpNjYChRlBGtHZf1SvSpVYAnsQQeFuQiWq8vWbrzTBlCAOalG:Pi5BrZPlBYHF6SpUeFBqRrzTXC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c837f20f5936507f93bc9400795b7011_JaffaCakes118
Files
-
c837f20f5936507f93bc9400795b7011_JaffaCakes118.dll windows:5 windows x86 arch:x86
783b130720a8d871712bb0f91c2bbeb0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GlobalFlags
GlobalAddAtomA
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCommandLineA
HeapAlloc
HeapFree
VirtualAlloc
VirtualQuery
HeapReAlloc
ExitProcess
HeapSize
GetStdHandle
GetACP
IsValidCodePage
LCMapStringA
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GlobalGetAtomNameA
GetCurrentProcessId
InterlockedIncrement
GetModuleHandleW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
ResumeThread
GlobalDeleteAtom
GetCurrentThreadId
GetLocaleInfoA
CompareStringA
lstrcmpA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProcAddress
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
DeleteFileA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MultiByteToWideChar
lstrlenA
GetTickCount
WritePrivateProfileStringA
GetModuleHandleA
FormatMessageA
LocalFree
GetTempPathA
GetModuleFileNameA
CreateEventA
CreateThread
SetEvent
WaitForSingleObject
GetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateFileA
CloseHandle
GetPrivateProfileStringA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
LCMapStringW
SizeofResource
user32
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
SetMenuItemBitmaps
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowTextA
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
SendMessageA
GetKeyState
ValidateRect
PeekMessageA
PostThreadMessageA
MsgWaitForMultipleObjects
PostMessageA
PostQuitMessage
UnhookWindowsHookEx
CharUpperA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyMenu
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetMenuCheckMarkDimensions
GetDlgItem
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
GetDeviceCaps
SaveDC
RestoreDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
ole32
CoCreateGuid
oleaut32
VariantChangeType
VariantClear
VariantInit
wsock32
bind
listen
WSAGetLastError
accept
gethostname
WSACleanup
gethostbyname
sendto
recvfrom
recv
ntohl
ntohs
__WSAFDIsSet
htonl
send
setsockopt
closesocket
select
connect
inet_ntoa
socket
htons
ioctlsocket
inet_addr
WSAStartup
ws2_32
freeaddrinfo
getaddrinfo
oleacc
LresultFromObject
CreateStdAccessibleObject
Exports
Exports
DeleteFileInfo
DeletepeerInfoBuf
FindFile
GetPeerList
PublishFile
ResetPublishingQueue
StartKademlia
StopKademlia
Sections
.text Size: 319KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ