c:\ProgrammingNew\DevTools\ExplorerRestart\Bin\ExplorerRestart32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb0d1f697f9a1f153511ecd696874f90_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb0d1f697f9a1f153511ecd696874f90_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb0d1f697f9a1f153511ecd696874f90_JaffaCakes118
-
Size
144KB
-
MD5
fb0d1f697f9a1f153511ecd696874f90
-
SHA1
0e6e6d10c112563e65eb753fc90bf22805d63536
-
SHA256
e4798759880902ac498ddecafd10eca6e459ac5ab18aef5bba679b729113ba25
-
SHA512
abc910f6f8352b163754413a12fa38106f9b8d9a75ef71631600a51b1e7ec7e52b01a67e4f1efadd10f5d164f294a1abf6529d181ffe9388b048304cb9c7d541
-
SSDEEP
1536:Z6F7+RXy+NU0xNOQDWPIXqrN/8SKH334uG8P955BtpYWCVCFIfmE1KmY4ULJLiz7:Eim0/OQDMI+0L0WCQZMnd98zZ7fgMti
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb0d1f697f9a1f153511ecd696874f90_JaffaCakes118
Files
-
fb0d1f697f9a1f153511ecd696874f90_JaffaCakes118.dll windows:4 windows x86 arch:x86
a5270036c682c46e71e0f1da91f9b392
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
shlwapi
StrStrIA
PathFileExistsA
kernel32
GetLastError
OpenProcess
CloseHandle
WaitForSingleObject
Sleep
ExpandEnvironmentStringsW
RtlUnwind
InitializeCriticalSection
LoadLibraryA
WriteFile
HeapSize
HeapReAlloc
VirtualAlloc
GetLocaleInfoA
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
RaiseException
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
user32
GetWindowThreadProcessId
PostMessageW
IsWindow
FindWindowW
GetClassNameW
shell32
ord155
ord18
ShellExecuteExA
ShellExecuteExW
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
oleaut32
VariantInit
Exports
Exports
ExplorerClose
ExplorerRestart
ExplorerStart
FreeExplorerSnapshot
RestoreExplorerSnapshot
RunDllExplorerClose
RunDllExplorerRestart
RunDllExplorerStart
TakeExplorerSnapshot
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE