Z:\source\repos\C-C++\metasploit-execute-assembly\HostingCLR_inject\x64\Release\HostingCLRx64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb1c19942766d23d9065568714281919_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb1c19942766d23d9065568714281919_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb1c19942766d23d9065568714281919_JaffaCakes118
-
Size
137KB
-
MD5
fb1c19942766d23d9065568714281919
-
SHA1
eafd4b3500b02a84f8977874afcc64dafc5dd67e
-
SHA256
f4dfacc227fff3a4e102b275d416a73b727fe0a2885537bf61098b86216323ed
-
SHA512
8d2982219d50fce6e5e0a8470bfb029d9139c13f58c718149eb0540f3a5e68291bd69172f88071ed693976273c8a8a19077c7faf0821d45e3c4a98d4481e886d
-
SSDEEP
3072:yP3xwET+MNWlVTMvI07OLLr8TPHsY8JlQ1J2Gmk0+:UwMBNWl90K/gTPHsYKnk0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb1c19942766d23d9065568714281919_JaffaCakes118
Files
-
fb1c19942766d23d9065568714281919_JaffaCakes118.dll windows:5 windows x64 arch:x64
084e24683b14ce6e00b18ae2358e303a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ReadProcessMemory
GetCurrentProcess
OpenProcess
GetCurrentProcessId
AttachConsole
AllocConsole
GetProcAddress
GetModuleHandleA
LoadLibraryA
CreateFileW
CloseHandle
HeapReAlloc
HeapSize
WriteConsoleW
SetFilePointerEx
SetStdHandle
LocalFree
GetLastError
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
InterlockedFlushSList
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
HeapFree
HeapAlloc
LCMapStringW
GetStdHandle
GetFileType
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
GetACP
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetStringTypeW
EncodePointer
shell32
CommandLineToArgvW
oleaut32
SafeArrayPutElement
SafeArrayCreateVector
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysAllocString
mscoree
CLRCreateInstance
Exports
Exports
?ReflectiveLoader@@YA_KPEAX@Z
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ