E:\MyProject\2011\RewriteDM-bank\playUnIEvoke\Release\playUnIEvoke.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d312cc9dd6e96977db9b093d4f0eac08_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d312cc9dd6e96977db9b093d4f0eac08_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d312cc9dd6e96977db9b093d4f0eac08_JaffaCakes118
-
Size
471KB
-
MD5
d312cc9dd6e96977db9b093d4f0eac08
-
SHA1
7689c058829ad5bac7f5386ac3d66468780357fc
-
SHA256
f18585d6554b9870669c7e3e3b44309222f009105d63105f825db1c6235cc96d
-
SHA512
a1285525ef4daea3d3fa38088c1c12950bc42b98ab201ae94870ea017dff56fdad0e08e3168b8d8d0432cf6c31fa318c682456024b4aca36e685a362bc36b2b8
-
SSDEEP
12288:RhNX52pLR86UFCLdSMkocQj9stquQczjmbYS37f8sgFvAs:Rb5AFRmNtNzib17fq3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d312cc9dd6e96977db9b093d4f0eac08_JaffaCakes118
Files
-
d312cc9dd6e96977db9b093d4f0eac08_JaffaCakes118.dll windows:5 windows x86 arch:x86
3f6f5019defd56680fb22e159dac7102
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
WSAStartup
WSACleanup
gethostbyname
ole32
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
wininet
HttpOpenRequestA
InternetCrackUrlA
InternetReadFile
HttpSendRequestA
GetUrlCacheEntryInfoA
InternetCloseHandle
InternetConnectA
InternetOpenA
urlmon
URLDownloadToFileA
kernel32
MultiByteToWideChar
WideCharToMultiByte
CreateFileA
GetFileSize
ReadFile
CloseHandle
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
Sleep
FindFirstFileA
FindClose
SetProcessWorkingSetSize
GetCurrentProcess
GetTickCount
DeviceIoControl
GetFullPathNameA
FindResourceA
lstrlenA
FreeLibrary
LoadResource
InterlockedIncrement
InterlockedDecrement
QueryDosDeviceA
UnlockFile
GetLogicalDrives
InitializeCriticalSectionAndSpinCount
SizeofResource
LeaveCriticalSection
IsDBCSLeadByte
lstrlenW
RaiseException
CreateDirectoryA
GetLastError
lstrcmpiA
GetProcAddress
RemoveDirectoryA
EnterCriticalSection
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
DeleteCriticalSection
CreateThread
WaitForSingleObject
lstrcpyA
lstrcatA
lstrcmpA
FindNextFileA
SetFileAttributesA
DeleteFileA
lstrcpynA
GetEnvironmentVariableA
GetCurrentDirectoryA
CopyFileA
GetWindowsDirectoryA
FlushInstructionCache
GetCurrentThreadId
SetLastError
SetFilePointer
WriteFile
GetLocalTime
GetFileInformationByHandle
GetPrivateProfileStringA
GetCompressedFileSizeA
GetSystemDirectoryA
GetVolumeInformationA
GetVersionExA
CreateProcessA
SetErrorMode
CreateEventA
CreateMutexA
WaitForMultipleObjects
GetBinaryTypeA
GetDiskFreeSpaceExA
SetEvent
OpenEventA
GetProcessHeap
LocalFree
GetLocaleInfoW
GetModuleFileNameW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStartupInfoW
GetFileType
GetStdHandle
SetHandleCount
HeapDestroy
HeapCreate
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RtlUnwind
GetCommandLineA
GetFileAttributesA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
DecodePointer
EncodePointer
InitializeCriticalSection
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
SetStdHandle
LoadLibraryW
WriteConsoleW
SetEndOfFile
CreateFileW
GetSystemTimeAsFileTime
user32
GetWindow
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
MapWindowPoints
GetMonitorInfoA
MonitorFromWindow
ShowWindow
UpdateWindow
CreateWindowExA
UnregisterClassA
CallWindowProcA
DefWindowProcA
LoadCursorA
GetClassInfoExA
RegisterClassExA
SetWindowLongA
SetWindowTextA
KillTimer
SetWindowPos
SetActiveWindow
SetTimer
PostQuitMessage
AdjustWindowRectEx
SendMessageA
DestroyWindow
GetWindowLongA
GetParent
CharNextA
GetClientRect
GetWindowRect
GetSystemMetrics
LoadImageA
MoveWindow
gdi32
DeleteObject
advapi32
RegSetValueExA
RegQueryValueA
RegSetValueA
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
oleaut32
SysAllocString
VariantClear
SysAllocStringLen
SysFreeString
VarUI4FromStr
Exports
Exports
Always
ConfigAd
PutTestSpecial
_2
msnpop
qqadpop
qweAwse
Sections
.text Size: 311KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ