c:\iBot - Silkroad\[iBot] Backup\edx33_RSRO\Release\iBot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f6d3bd2193eb01a307af7011814dc608_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6d3bd2193eb01a307af7011814dc608_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f6d3bd2193eb01a307af7011814dc608_JaffaCakes118
-
Size
333KB
-
MD5
f6d3bd2193eb01a307af7011814dc608
-
SHA1
69550ef60a57deb0b36236b4f7d1ed6514c5f743
-
SHA256
300764c33275ad31f7a5ba2bb154116cccdf71a2b9c02a22678babf5d471c509
-
SHA512
50f4e8e2da635b891e3e1bc51fc07c07897002d46576cf627ce017fc94f95638c7cb4399e200aef47665c1f91ce0cb3250f30fa0aa6d296cb94449dcb4f4f546
-
SSDEEP
6144:JVMy3l+o1oSpB1sOtMRQDtMVTfm1jZ/hT/0akuyjKr5+kzgb+f3POwKg9nG1XMAF:JVHVTFRDQTfm1j/T167bwfOXg9sX5F5G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6d3bd2193eb01a307af7011814dc608_JaffaCakes118
Files
-
f6d3bd2193eb01a307af7011814dc608_JaffaCakes118.dll windows:5 windows x86 arch:x86
4aebba3b79ca1dc0fac2db17d766cdb3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateThread
InitializeCriticalSection
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
OpenProcess
CreateMutexA
CloseHandle
WriteProcessMemory
WaitForSingleObject
SetEvent
GetTickCount
CreateEventA
ResetEvent
GetModuleHandleA
ResumeThread
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
user32
MessageBoxA
DestroyWindow
GetMessageA
PostThreadMessageA
TranslateMessage
FindWindowA
SetWindowTextA
RegisterClassA
DispatchMessageA
PostMessageA
DefWindowProcA
CreateWindowExA
GetWindowLongA
UnregisterClassA
SetWindowLongA
GetWindowThreadProcessId
ole32
CoCreateGuid
msvcp90
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
msvcr90
_crt_debugger_hook
_except_handler4_common
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__clean_type_info_names_internal
_CxxThrowException
__CppXcptFilter
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
memmove_s
sprintf
mbstowcs
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
memset
??_V@YAXPAX@Z
exit
strlen
_snprintf
rand
srand
strcpy
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_malloc_crt
free
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CxxFrameHandler3
ws2_32
WSAStartup
connect
inet_addr
gethostbyaddr
freeaddrinfo
WSAGetLastError
getaddrinfo
ntohs
inet_ntoa
getpeername
htons
WSACleanup
recv
bind
socket
closesocket
send
WSAAsyncSelect
listen
accept
gethostbyname
Exports
Exports
_NewLogin@12
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 260KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ