X:\bnxzQTjjiaQnt\ykVKniwNajIsdi\khrbCnxkfftX\jKuRpbXn\JFeBQXfarZfAaO.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d094c666200f6219d86b627216c83db6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d094c666200f6219d86b627216c83db6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d094c666200f6219d86b627216c83db6_JaffaCakes118
-
Size
112KB
-
MD5
d094c666200f6219d86b627216c83db6
-
SHA1
37b451ea97475dd309ff10f94c9bc74300291a85
-
SHA256
5e4afc99883dfc8b6d4dfd6b600d5a359d3c8e71cee5a77865dfb24b8866b209
-
SHA512
d162116bdd0d2c0cc5a9a271818cc532c208278eaf924ccbb0b83cdd4bf4fc786c6f95a321a337c05a8fa8f85fb22f3e50a9f3efec47a28d9b2ba3a3e82ae8e1
-
SSDEEP
3072:M4ihweviW9gfMzLjs/oS0hSZJrhJsosZ:DihweaPMz0NHrhJs/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d094c666200f6219d86b627216c83db6_JaffaCakes118
Files
-
d094c666200f6219d86b627216c83db6_JaffaCakes118.dll windows:5 windows x86 arch:x86
b3dc2e48535ff5aff07813370f4a6ee9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
gdi32
StretchDIBits
RealizePalette
StretchBlt
Rectangle
CreateCompatibleDC
SetWindowOrgEx
GetTextExtentPointW
EnumFontFamiliesW
GetClipBox
CreateDIBitmap
CreateDCW
CreateRectRgnIndirect
Ellipse
WidenPath
SetLayout
CreateFontW
ExtFloodFill
ExtTextOutA
MoveToEx
shlwapi
StrCatBuffW
user32
InsertMenuItemW
GetScrollInfo
CreateWindowExW
ShowCaret
CreateCursor
SetWindowPos
CopyImage
IntersectRect
MapVirtualKeyExW
ShowCursor
DialogBoxParamW
CreateDialogParamA
FindWindowA
DrawFocusRect
GetDlgItemTextA
WaitMessage
GetWindowTextA
LookupIconIdFromDirectory
IsWindowVisible
GetMenuCheckMarkDimensions
ClientToScreen
GetClassLongW
GetShellWindow
UpdateWindow
CheckMenuItem
SetScrollInfo
PostMessageW
KillTimer
IsCharAlphaNumericW
CharUpperW
ShowWindow
CharUpperA
ModifyMenuW
SetScrollPos
TrackPopupMenu
DrawEdge
IsCharAlphaNumericA
PostThreadMessageA
LoadImageW
DragObject
CharNextA
CreateCaret
GetWindowPlacement
DefWindowProcA
LoadImageA
kernel32
GetModuleHandleA
OpenFileMappingW
EnumResourceTypesA
CreateMailslotW
WinExec
GetStartupInfoA
GetFileTime
SearchPathW
LeaveCriticalSection
GetVersionExA
GetSystemWindowsDirectoryW
LCMapStringW
GetFileAttributesA
SetThreadExecutionState
FindFirstFileA
CreateSemaphoreW
LoadLibraryW
HeapCreate
LoadLibraryExA
GetFileAttributesExW
HeapAlloc
CreateFileW
comctl32
InitCommonControlsEx
ImageList_Read
DestroyPropertySheetPage
msvcrt
_controlfp
__set_app_type
__p__fmode
puts
strcpy
__p__commode
rand
_amsg_exit
_initterm
_acmdln
exit
strtol
localtime
_ismbblead
towlower
wcschr
_XcptFilter
isprint
_exit
time
strncpy
toupper
_cexit
atol
realloc
__setusermatherr
__getmainargs
Exports
Exports
InstallU
?GlobalMemoryExW@@YGIIGFJ~U
PluginCommand
PluginMain
PluginName
?HideFunctionEx@@YGPAKJ~U
PluginType
?LoadHeaderOriginal@@YGDPAK~U
PluginVersion
WSPStartup
?EnumOptionOld@@YGPAXKHPA_NF~U
?ExecuteLoaderTrayXBwyGD@@YGKGHE@Z
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticx Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kip Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticy Size: 1024B - Virtual size: 534B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zdata Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.heap Size: - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ