e:\Projects\AM\Program\bin\release\swkbhk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d666641f10e642ef6753e98a6d9d552c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d666641f10e642ef6753e98a6d9d552c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d666641f10e642ef6753e98a6d9d552c_JaffaCakes118
-
Size
100KB
-
MD5
d666641f10e642ef6753e98a6d9d552c
-
SHA1
e6bc5953f4a2cf3a596e89d3897d73b04775bd5b
-
SHA256
18515bb49a8c95b0bd0bb95faac880479c0e28afa67671f731e4ab603228bb95
-
SHA512
a6a8cd566acadf0b534d5cc22a9e016634f2a64df5510547fc6580a16bec2cfb152d1f3a6e36d5279350d3ecbb4dfe122ca8822542a30374c56d8253b83e4873
-
SSDEEP
1536:+J/RGZFBubkqVtFZ2r8/8Li0srQ8JIDnPtA:+ZY8kqbyLieVLPtA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d666641f10e642ef6753e98a6d9d552c_JaffaCakes118
Files
-
d666641f10e642ef6753e98a6d9d552c_JaffaCakes118.dll windows:4 windows x86 arch:x86
2860f7d7e859eb5131ebd8462519cf0c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
DisableThreadLibraryCalls
GetCurrentProcessId
CompareStringW
CompareStringA
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
GetCurrentThread
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WriteFile
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
GetLocaleInfoA
GetLocaleInfoW
GetTimeFormatA
GetDateFormatA
SetEnvironmentVariableA
user32
GetWindowThreadProcessId
UnhookWindowsHookEx
SetWindowsHookExW
MapVirtualKeyW
GetKeyboardState
ToUnicode
FindWindowW
PostMessageW
CallNextHookEx
Exports
Exports
InstallHook
InstallShellHook
ReleaseHook
ReleaseShellHook
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
shdata Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ