e:\prj\mop_20111115\release\psifreak.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb7a97229f55021c60f3a715d22e1306_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb7a97229f55021c60f3a715d22e1306_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eb7a97229f55021c60f3a715d22e1306_JaffaCakes118
-
Size
424KB
-
MD5
eb7a97229f55021c60f3a715d22e1306
-
SHA1
01181e60534d02732da8df7431d6e9b62159f8a7
-
SHA256
39ebcf4f386f35f3ec519dc614b85e69d3f2b4bc6574c7380cbd07d2e01c710c
-
SHA512
2b3a7c2e6abb66ca2b489dcdb7746b75310120bfb11067e56272be43fab5d64a06d16679ad4b50323d7f65bab213d2ad3c163e71f66ee772bde4e889c4da5b15
-
SSDEEP
6144:8VR8dJmGV1W8ggpo6zNdNdNjLLl554Wis:I+JmQW8bX55As
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb7a97229f55021c60f3a715d22e1306_JaffaCakes118
Files
-
eb7a97229f55021c60f3a715d22e1306_JaffaCakes118.dll windows:4 windows x86 arch:x86
9313270be3435ddb4c316e5a73567a8e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
wininet
InternetReadFile
InternetOpenA
HttpQueryInfoA
InternetSetFilePointer
InternetOpenUrlA
InternetCloseHandle
DeleteUrlCacheEntry
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
kernel32
GetStringTypeW
LCMapStringW
WaitForSingleObject
MultiByteToWideChar
WideCharToMultiByte
Sleep
GetSystemDirectoryA
CreateProcessA
CloseHandle
lstrlenA
LoadResource
LockResource
SizeofResource
FindResourceA
FindResourceExA
GetLastError
GetProcAddress
CompareStringA
InterlockedExchange
LoadLibraryA
FreeLibrary
CompareStringW
GetVersionExA
LoadLibraryW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
SetEndOfFile
ReadFile
FlushFileBuffers
SetEnvironmentVariableA
GetThreadLocale
HeapAlloc
FreeEnvironmentStringsW
GetEnvironmentStrings
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetConsoleCP
GetConsoleMode
DeleteFileA
FreeEnvironmentStringsA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
HeapFree
VirtualAlloc
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetProcessHeap
RaiseException
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetStdHandle
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
ExitProcess
CreateFileA
GetTimeZoneInformation
GetLocaleInfoA
user32
UnregisterClassA
advapi32
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
Exports
Exports
ServiceMain
_HandlerEx@16
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ