dbg1sym2.p1d1b
Static task
static1
Behavioral task
behavioral1
Sample
fbd1953ea5d5180e7a2701b6a0c1e4c3_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fbd1953ea5d5180e7a2701b6a0c1e4c3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fbd1953ea5d5180e7a2701b6a0c1e4c3_JaffaCakes118
-
Size
116KB
-
MD5
fbd1953ea5d5180e7a2701b6a0c1e4c3
-
SHA1
b85e858588c79bfeb53fc052194be0c1960f8082
-
SHA256
f1bd345445d9f810ecceafb33366e5294c0c24e6175006c5cf5fdd275b3c97a1
-
SHA512
11b87f3ab4f9fe93eeec6e911baed823b54d7b006186abe2dd523ecec76004e1e1819cec37aee77dfb46c44d8b4957e90b49517aaf6820e103eebdd283642996
-
SSDEEP
1536:pn1NL9OIEHp3KpOU33oNgf9JGsu3EsGFPlwPoLn/UpkdIZor3G5vammz:ZJOTp3S93Wa9Q9UsoPlwgDsToS57g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fbd1953ea5d5180e7a2701b6a0c1e4c3_JaffaCakes118
Files
-
fbd1953ea5d5180e7a2701b6a0c1e4c3_JaffaCakes118.dll windows:4 windows x86 arch:x86
79fc9ca2324d334e8839401d05ffb970
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
ResetEvent
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSection
lstrcpyW
lstrcatW
SetLastError
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetLastError
FreeEnvironmentStringsA
GetProcAddress
LoadLibraryExW
Sleep
InterlockedCompareExchange
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
IsBadCodePtr
IsBadReadPtr
VirtualQuery
IsBadWritePtr
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
HeapSize
HeapReAlloc
HeapAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
InterlockedExchangeAdd
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
InterlockedDecrement
GetModuleFileNameA
GetStdHandle
WriteFile
GetModuleHandleA
RaiseException
RtlUnwind
GetVersionExA
GetCommandLineA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateNamedPipeA
ConnectNamedPipe
ReadFile
DisconnectNamedPipe
CreateTimerQueueTimer
CreateEventA
CreateThread
WaitForMultipleObjects
InterlockedExchange
DeleteTimerQueueTimer
ExitProcess
GetCurrentProcessId
InterlockedIncrement
GetCurrentProcess
DuplicateHandle
CloseHandle
OpenProcess
SetEvent
MoveFileA
CreateMutexW
GetStartupInfoA
ReleaseMutex
user32
wsprintfW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Exports
Exports
qoikabsmf
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 694B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ