i:\1传奇外传资料\A备份\1移动单\lele二代\m16魔兽世界VC2005\wow防D-TT版多地址\wowpic\release\MWDL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0cb00fe112d877729f073dba2d4b2b45_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cb00fe112d877729f073dba2d4b2b45_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0cb00fe112d877729f073dba2d4b2b45_JaffaCakes118
-
Size
50KB
-
MD5
0cb00fe112d877729f073dba2d4b2b45
-
SHA1
7618d7043cfae389679de8ba0529b34f0460f8af
-
SHA256
ed996d20506067402015ea4743c958b7a905a4942f41769e622a6eaebe284c50
-
SHA512
bc5488c5d6d6b9913165be245c753ffc92f96e6e2bd27d36ec1fb5d67c3008fdb0b9d156eccaaa3352ea7aaef25367e243ffde91de85120bdf02fd52cb161a16
-
SSDEEP
768:OGX+zceWeQ350ffTW40LXLvvcZcLCRVFcz1JbrXPNCuKc/HZ2VhoqhMd:+yLXLMje1pXPceHMbHmd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cb00fe112d877729f073dba2d4b2b45_JaffaCakes118
Files
-
0cb00fe112d877729f073dba2d4b2b45_JaffaCakes118.dll windows:4 windows x86 arch:x86
d6bf947c87b92b357be41b2ecc765a89
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
lstrcpynA
CreateFileA
ReadFile
GetFileSize
CloseHandle
GetTempPathA
DeleteFileA
MultiByteToWideChar
GlobalAlloc
GlobalLock
WriteFile
GlobalUnlock
GlobalFree
CreateToolhelp32Snapshot
Process32First
GetTickCount
VirtualAlloc
GetModuleHandleA
GetPrivateProfileStringA
CreateThread
WideCharToMultiByte
GetSystemTime
WritePrivateProfileStringA
GetModuleFileNameA
SetFilePointer
CreateMutexA
GetLastError
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcmpiA
lstrlenA
ExitProcess
lstrcmpA
Sleep
VirtualProtect
lstrcpyA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
Process32Next
OutputDebugStringA
user32
PostThreadMessageA
SetWindowsHookExA
CallNextHookEx
GetSystemMetrics
EnumWindows
GetDC
ReleaseDC
IsRectEmpty
GetWindowTextA
IsWindowVisible
IsIconic
GetActiveWindow
ShowWindow
SetForegroundWindow
FindWindowA
FindWindowExA
GetWindowThreadProcessId
GetWindowInfo
PrintWindow
gdi32
GetDIBits
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectA
CreateDCA
GetDeviceCaps
DeleteDC
GetStockObject
SelectPalette
RealizePalette
ws2_32
inet_ntoa
gethostbyname
gdiplus
GdipGetImageEncoders
GdipSaveImageToFile
GdipCloneImage
GdipLoadImageFromFile
GdipDisposeImage
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipGetImageEncodersSize
wininet
InternetOpenA
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestExA
HttpEndRequestA
msvcrt
??2@YAPAXI@Z
??3@YAXPAX@Z
atoi
malloc
free
memmove
strstr
sprintf
??1type_info@@UAE@XZ
memset
memcpy
_except_handler3
_local_unwind2
Exports
Exports
HHHH
InstallService
KsCreateAllocator
KsCreateClock
KsCreatePin
KsCreateTopologyNode
UUUU
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ