C:\Users\Matheus\Desktop\Tranqueiras de GunZ\src_ruby_sem_bugs\Release\RubyDLL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
06ec3680cb7fcd4d28321c5a5c38d2e0_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
06ec3680cb7fcd4d28321c5a5c38d2e0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
06ec3680cb7fcd4d28321c5a5c38d2e0_JaffaCakes118
-
Size
100KB
-
MD5
06ec3680cb7fcd4d28321c5a5c38d2e0
-
SHA1
78a3be5f7d330a31d5c305c1712cc072f37fc2de
-
SHA256
3c344538e736dc5e5d1fcb68a6143e7e99b317d84b6e304b634adabb93024268
-
SHA512
046419feea4aa2705bb7d96dbac561e650f56a15ef88ffe3045546067c14500e54f8df281f575ff00e1e843d1b4a13ec9bec02eff56d9cabac82eec0c1daca09
-
SSDEEP
1536:/tixxWaekZC4VQFQCv0+b9wmoOZDdFG+5c851gqf3HXNACQZV4TUbJmz2cOoT6Nu:ViPIeCs+bi9OZD7vCe/3NQZCTgJmQo0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06ec3680cb7fcd4d28321c5a5c38d2e0_JaffaCakes118
Files
-
06ec3680cb7fcd4d28321c5a5c38d2e0_JaffaCakes118.dll windows:5 windows x86 arch:x86
17efbeb46d44f4b2736b99be536d5652
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
d3d9
Direct3DCreate9
d3dx9_43
D3DXCreateFontA
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
ws2_32
recv
socket
closesocket
WSAGetLastError
inet_addr
WSAStartup
connect
htons
kernel32
FlushInstructionCache
SetLastError
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
GetCurrentProcess
GetTickCount
GetProcAddress
LoadLibraryA
VirtualProtect
HeapAlloc
GetProcessHeap
DisableThreadLibraryCalls
CreateThread
ExitProcess
Sleep
QueryPerformanceCounter
user32
MessageBoxA
msvcr100
memset
__CxxFrameHandler3
??0exception@std@@QAE@ABV01@@Z
memcpy
__clean_type_info_names_internal
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
rand
srand
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
_vsnprintf_s
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
_CxxThrowException
memmove
??_U@YAPAXI@Z
strstr
atoi
vsprintf_s
isdigit
_time64
_unlock
__dllonexit
_lock
_onexit
_malloc_crt
free
_encoded_null
_initterm
_initterm_e
_amsg_exit
__CppXcptFilter
_crt_debugger_hook
_except_handler4_common
msvcp100
?_Xlength_error@std@@YAXPBD@Z
Exports
Exports
_rubyragezone@12
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE