C:\dll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
022ad16a53f9bf97077fdac02d65ce36_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
022ad16a53f9bf97077fdac02d65ce36_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
022ad16a53f9bf97077fdac02d65ce36_JaffaCakes118
-
Size
126KB
-
MD5
022ad16a53f9bf97077fdac02d65ce36
-
SHA1
e44c8ebfe834264bf31a6bd02837103e6ed71f72
-
SHA256
ee2ca9fdcd056c2c8d661de851047c21f880f296c8987ca2319123eb83fd47a9
-
SHA512
8ae5c4c23de473397a14f1ec0812bcf9fd041ed57bffcec257dfa0c90243511c6cbbf0a5d784fff3e83573af64aa50f700d831874aa91d87ea85dff23087075f
-
SSDEEP
3072:6XVQ+UGGEseB005M+GlWvZQWKAl2XwiQiOcCAfud:6Q+l9sQZ9yU0Cz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 022ad16a53f9bf97077fdac02d65ce36_JaffaCakes118
Files
-
022ad16a53f9bf97077fdac02d65ce36_JaffaCakes118.dll windows:5 windows x86 arch:x86
ecdcba60af62dce3f56961a1017710ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_adjust_fdiv
malloc
_initterm
free
atoi
strrchr
strstr
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
memset
_except_handler3
shlwapi
SHDeleteKeyA
PathFileExistsA
ws2_32
bind
sendto
setsockopt
gethostname
WSAResetEvent
socket
WSAStartup
getaddrinfo
WSACleanup
freeaddrinfo
WSAAddressToStringA
gethostbyname
WSACreateEvent
closesocket
mpr
WNetOpenEnumA
WNetCloseEnum
WNetAddConnection2A
psapi
GetModuleFileNameExA
GetModuleInformation
rpcrt4
UuidFromStringA
UuidToStringA
wintrust
WinVerifyTrust
wininet
GetUrlCacheEntryInfoA
kernel32
GetTickCount
ExitProcess
GetSystemDirectoryA
CreateThread
GetFileTime
FindNextFileA
CopyFileA
DeviceIoControl
GetModuleFileNameA
ResumeThread
TransactNamedPipe
TerminateProcess
GlobalAlloc
GlobalFree
lstrcpyA
SetEvent
GetCurrentThreadId
OpenThread
CreateNamedPipeA
FlushFileBuffers
DisconnectNamedPipe
ExitThread
Thread32Next
OpenEventA
GetExitCodeThread
CreateFileMappingA
FindClose
ConnectNamedPipe
GetCurrentProcess
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
GetLogicalDrives
MoveFileExA
CreateToolhelp32Snapshot
FreeLibrary
GetCurrentProcessId
CreateFileA
lstrlenA
OpenProcess
Sleep
ReadFile
lstrcmpiA
WinExec
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
GetProcAddress
LoadLibraryA
GetModuleHandleA
LoadLibraryExA
GetFileSize
SetFilePointer
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SetEndOfFile
WaitForSingleObject
RemoveDirectoryA
FlushViewOfFile
SetFileTime
GetWindowsDirectoryA
WriteFile
GetDriveTypeA
TerminateThread
CreateEventA
GetExitCodeProcess
CreateProcessA
lstrcatA
MultiByteToWideChar
FindFirstFileA
GetLogicalDriveStringsA
GetLocalTime
user32
SetProcessWindowStation
OpenDesktopA
wsprintfA
OpenWindowStationA
SetThreadDesktop
advapi32
CreateProcessAsUserA
CloseServiceHandle
RegSetValueExA
CreateServiceA
StartServiceA
RegOpenKeyExA
OpenSCManagerA
RegCloseKey
OpenProcessToken
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ