renncuvoaa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d9df4ad0e97e0c379819de2195831c4d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9df4ad0e97e0c379819de2195831c4d_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
d9df4ad0e97e0c379819de2195831c4d_JaffaCakes118
-
Size
49KB
-
MD5
d9df4ad0e97e0c379819de2195831c4d
-
SHA1
6b38cb7abc7bacbbd4f02f61ec36967317e92ddc
-
SHA256
9ce4fee36442c1749168801443e17986a71ff3fcf0d88aa0083f5d5c5c80f37b
-
SHA512
b964981dc579072b0d550abee1ed94093445329af0e530921a7dd4d51e4379fc20ccd5d0d9e96b4cf74d5b82d6e77c64cd96cf8eed7bde036dff710234dad749
-
SSDEEP
768:NpeR+24ITeqdA2ZXIAin1uIj6klnOH4ilSCSfeMG1RRIkQf:NpFjNqHZHi5pjWSPH4Rs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9df4ad0e97e0c379819de2195831c4d_JaffaCakes118
Files
-
d9df4ad0e97e0c379819de2195831c4d_JaffaCakes118.dll windows:4 windows x86 arch:x86
4eaa6a39019fdde8ba1831059dc3318b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FreeLibrary
LoadLibraryW
InterlockedIncrement
InterlockedDecrement
lstrcpyW
CloseHandle
MulDiv
SetEvent
MultiByteToWideChar
GetCurrentThreadId
GetProcAddress
GlobalAlloc
LoadLibraryA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateEventW
GetTickCount
GetTempPathW
GetTempFileNameW
CopyFileW
ReadFile
GetFileAttributesW
CreateFileW
WriteFile
GlobalFree
DeleteFileW
ResetEvent
GetLocalTime
lstrcatW
GetUserDefaultLCID
GetCurrentDirectoryW
FormatMessageW
LocalFree
lstrcmpW
GetModuleHandleA
QueryPerformanceCounter
lstrlenW
advapi32
IsValidSid
msvcrt
exit
Exports
Exports
yqqdn
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ