d:\产品\NewCode\2wow\wowpic\release\MWDL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dd36396e4bc0bab91fa73c87b63c0746_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd36396e4bc0bab91fa73c87b63c0746_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dd36396e4bc0bab91fa73c87b63c0746_JaffaCakes118
-
Size
48KB
-
MD5
dd36396e4bc0bab91fa73c87b63c0746
-
SHA1
935b8b9a9ebc947ecee3c494a1baa5d1b2cb647c
-
SHA256
7995fbf6d57db8eaf747d535f6e443361cc16695f5bc5bdd19dc1fe46ed78e07
-
SHA512
054fc23a0b64335528b31d6836a4b692177899e7947efc311bb55d40de8780de219d078b33c888578176674bd08d5c5730fbbfbc8d81702d63bc34857c729b50
-
SSDEEP
768:Pz0fjjjZGixfoykwHu6WyAjMxwECdmMlV9Jai3KjdC9KcQwRK1:P2EjMKErw6jsKww1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd36396e4bc0bab91fa73c87b63c0746_JaffaCakes118
Files
-
dd36396e4bc0bab91fa73c87b63c0746_JaffaCakes118.dll windows:4 windows x86 arch:x86
c526c2fa037865faec99be3c26118f40
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
lstrcpynA
CreateFileA
ReadFile
GetFileSize
CloseHandle
GetTempPathA
DeleteFileA
MultiByteToWideChar
GlobalAlloc
GlobalLock
WriteFile
GlobalUnlock
GlobalFree
CreateToolhelp32Snapshot
Process32First
GetTickCount
VirtualAlloc
GetModuleHandleA
GetPrivateProfileStringA
CreateThread
WideCharToMultiByte
GetSystemTime
WritePrivateProfileStringA
GetModuleFileNameA
SetFilePointer
CreateMutexA
GetLastError
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcmpiA
lstrlenA
ExitProcess
lstrcmpA
Sleep
VirtualProtect
lstrcpyA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
Process32Next
OutputDebugStringA
user32
PostThreadMessageA
SetWindowsHookExA
CallNextHookEx
GetSystemMetrics
GetDC
ReleaseDC
IsRectEmpty
GetWindowTextA
IsWindowVisible
IsIconic
GetActiveWindow
ShowWindow
SetForegroundWindow
FindWindowA
FindWindowExA
GetWindowThreadProcessId
GetWindowInfo
EnumWindows
PrintWindow
gdi32
CreateCompatibleDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
GetObjectA
CreateDCA
GetDeviceCaps
DeleteDC
GetStockObject
SelectPalette
RealizePalette
GetDIBits
ws2_32
gethostbyname
inet_ntoa
gdiplus
GdipSaveImageToFile
GdipCloneImage
GdipGetImageEncoders
GdipDisposeImage
GdipAlloc
GdipFree
GdiplusStartup
GdipLoadImageFromFile
GdiplusShutdown
GdipGetImageEncodersSize
wininet
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestExA
HttpEndRequestA
InternetCloseHandle
msvcrt
??2@YAPAXI@Z
??3@YAXPAX@Z
atoi
malloc
free
memmove
strrchr
strstr
sprintf
??1type_info@@UAE@XZ
memset
memcpy
_except_handler3
_local_unwind2
Exports
Exports
DeleteSelf
HHHH
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
UUUU
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ