ntintite.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eec539a14ea653c3a88bb4862b57f16d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eec539a14ea653c3a88bb4862b57f16d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eec539a14ea653c3a88bb4862b57f16d_JaffaCakes118
-
Size
49KB
-
MD5
eec539a14ea653c3a88bb4862b57f16d
-
SHA1
e3df9e72373419f1460a3360313706d127506ab0
-
SHA256
e66f68609b8ed7027d8d0f7102e52147071db9bdafc16297e54c13494f72756a
-
SHA512
498eacf7d0ea85e27b10911976a963d2cb3e9c94d1acb42865e6e103eeab28fbbc12b70420d53c3cba4ebd990e6190ad44c026110cfdb8eb9bfd370c01ad204c
-
SSDEEP
768:NBuHGi6FSN2Ej11o1hIhjHWxVI7Z01F6X02zU3xJA0m74oNcNQ3d8J:NBuH5Kg1i1hIhrZklJZ6UNQ3m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eec539a14ea653c3a88bb4862b57f16d_JaffaCakes118
Files
-
eec539a14ea653c3a88bb4862b57f16d_JaffaCakes118.dll windows:4 windows x86 arch:x86
4eaa6a39019fdde8ba1831059dc3318b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FreeLibrary
LoadLibraryW
InterlockedIncrement
InterlockedDecrement
lstrcpyW
CloseHandle
MulDiv
SetEvent
MultiByteToWideChar
GetCurrentThreadId
GetProcAddress
GlobalAlloc
LoadLibraryA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateEventW
GetTickCount
GetTempPathW
GetTempFileNameW
CopyFileW
ReadFile
GetFileAttributesW
CreateFileW
WriteFile
GlobalFree
DeleteFileW
ResetEvent
GetLocalTime
lstrcatW
GetUserDefaultLCID
GetCurrentDirectoryW
FormatMessageW
LocalFree
lstrcmpW
GetModuleHandleA
QueryPerformanceCounter
lstrlenW
advapi32
IsValidSid
msvcrt
exit
Exports
Exports
tvtqnf
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ