e:\Workspace\Module\ExceptionRecord\Src\ExceptionRecord\Release\ExcpRecord.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d15be76ee38103e2ea57fbb82332e817_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d15be76ee38103e2ea57fbb82332e817_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d15be76ee38103e2ea57fbb82332e817_JaffaCakes118
-
Size
84KB
-
MD5
d15be76ee38103e2ea57fbb82332e817
-
SHA1
a0b0e9757f5b5f2f1e94ef62da2d128133185f3d
-
SHA256
9974ca9893a9fd1a9dc9df8f4d1bfc89cd195c09953d385e462e0347a28b16a3
-
SHA512
8173f39d718083148e48af11f30c5b155a0ab8013f01dafe71f2da8c6ada60595d0f228f7356aa9be1742c747e85e51ec9bd806b4f3adae74d2258d267c7ae31
-
SSDEEP
1536:i76RaEE2nQieajYMwXwB/9D3wJ8mF/7ofJsUlmZlv:YSEtmKAf8ufJFlmZl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d15be76ee38103e2ea57fbb82332e817_JaffaCakes118
Files
-
d15be76ee38103e2ea57fbb82332e817_JaffaCakes118.dll windows:4 windows x86 arch:x86
5824ced72c80d564b9f35d9844c8ce76
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThread
OutputDebugStringA
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
CloseHandle
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
ExitProcess
Sleep
Module32Next
Module32First
CreateToolhelp32Snapshot
InitializeCriticalSection
DeleteCriticalSection
CreateProcessA
GetModuleFileNameA
ResumeThread
GetThreadContext
SuspendThread
ReadProcessMemory
VirtualQuery
InterlockedCompareExchange
VirtualProtect
FlushInstructionCache
SetThreadContext
GetLastError
VirtualAlloc
GetProcAddress
FreeLibrary
LoadLibraryA
SetLastError
GetModuleHandleA
FlushFileBuffers
RtlUnwind
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetOEMCP
GetCPInfo
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapReAlloc
HeapAlloc
TerminateProcess
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
InterlockedExchange
SetFilePointer
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoA
GetSystemInfo
dbghelp
SymGetModuleBase64
SymFunctionTableAccess64
StackWalk64
MiniDumpWriteDump
SymInitialize
shlwapi
PathFileExistsA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Exports
Exports
EnableSEH
InstallSEH
RecordException
RestoreSEH
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ