c:\Users\DL_Win7x64\Documents\Visual Studio 2008\Projects\RAZER_D3D9\Release\RAZER_D3D9.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eaa8508b0fb3a6283b08cbfda852c09d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa8508b0fb3a6283b08cbfda852c09d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eaa8508b0fb3a6283b08cbfda852c09d_JaffaCakes118
-
Size
272KB
-
MD5
eaa8508b0fb3a6283b08cbfda852c09d
-
SHA1
1448e9eed5ad8d5789121b8a6e2acf0859c4e7d2
-
SHA256
c567cae9774816ec1afefa12a07b6c0e2b5fcb20920eab672c4ceada5babc506
-
SHA512
9ab6a9b03c542d07e31c7e39c807b2e0a1473862816e807a31b688ca6cfcf177b232fa9525c7945e77ec6e4deba3547e1b957a52e7564a4dc64280cddb685d17
-
SSDEEP
6144:V/CrBTlNf/KYsH1kQeeaQee5QeesQee29QeehQeeg66n6MM2UKO2rC2t4dEZtp7c:V6rBhBJxed2SHQuBL5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eaa8508b0fb3a6283b08cbfda852c09d_JaffaCakes118
Files
-
eaa8508b0fb3a6283b08cbfda852c09d_JaffaCakes118.dll windows:5 windows x86 arch:x86
61dfe5618edd8e2c79948ac652dd7dc9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
CreateThread
CloseHandle
VirtualProtect
Sleep
IsBadReadPtr
ExitProcess
MulDiv
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
DisableThreadLibraryCalls
GetVolumeInformationA
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
OutputDebugStringA
InterlockedExchange
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
user32
GetAsyncKeyState
GetCursorPos
MessageBoxA
GetSystemMetrics
wsprintfA
gdi32
CreateDIBSection
CreateFontA
GetDeviceCaps
SetBkColor
GetTextExtentPoint32A
DeleteDC
SetTextColor
DeleteObject
SelectObject
CreateCompatibleDC
ExtTextOutA
SetTextAlign
SetMapMode
advapi32
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptGetHashParam
RegQueryValueExA
RegOpenKeyA
RegCloseKey
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
msvcp90
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHPBDH@Z
?uncaught_exception@std@@YA_NXZ
?open@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXPBDHH@Z
msvcr90
??3@YAXPAX@Z
_CIacos
_finite
_ftol
__CxxFrameHandler
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_malloc_crt
free
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_crt_debugger_hook
_except_handler4_common
__clean_type_info_names_internal
__CxxFrameHandler3
memset
clock
malloc
ceil
_time64
_localtime64
_vsnprintf
remove
??2@YAPAXI@Z
sprintf
_CIatan
_CIatan2
_CIcos
_CIsin
_CIsqrt
memcpy
winmm
sndPlaySoundA
Sections
_TEXT Size: 512B - Virtual size: 431B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ