c:\Users\abc\Desktop\1qq23q PUB\VIP Menu\VIP Menu\G00dFight\NinoD3D.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0aac4d69a2abd7cb569c94f8ffd20caf_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0aac4d69a2abd7cb569c94f8ffd20caf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0aac4d69a2abd7cb569c94f8ffd20caf_JaffaCakes118
-
Size
142KB
-
MD5
0aac4d69a2abd7cb569c94f8ffd20caf
-
SHA1
14b6eb808095b4980fc261b5d593e13b301fb7fa
-
SHA256
b6dfa914731e194088212b21b64a50f60a88b59e063d967023320cefe9148362
-
SHA512
b6eb85734b9127345150d7464d02d1b58431ccb3d8b8a3334f9f3c33680bfae87a81365ee51a169740392f1427cba2d4f9d68a954b27213cd1743c6a943042e4
-
SSDEEP
3072:ABuopy4wdCQZCNB/tKM2H6ZKUVLyfCgr2VQeeaQeefQeesQeeiqQeehQee7hriU4:ABuo+dCsCr/L2HiRVQeeaQeefQeesQe0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0aac4d69a2abd7cb569c94f8ffd20caf_JaffaCakes118
Files
-
0aac4d69a2abd7cb569c94f8ffd20caf_JaffaCakes118.dll windows:5 windows x86 arch:x86
7e7bd5ed93c78e75702e0137c96af8c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleHandleA
GetCurrentProcessId
GetCurrentThreadId
OutputDebugStringA
DeleteFileA
GetModuleFileNameA
GetPrivateProfileIntA
FlushInstructionCache
GetCurrentProcess
VirtualQuery
MulDiv
CreateThread
DisableThreadLibraryCalls
VirtualProtect
VirtualAlloc
Sleep
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
IsProcessorFeaturePresent
InterlockedCompareExchange
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedExchange
user32
SetRect
keybd_event
GetAsyncKeyState
GetSystemMetrics
gdi32
SetTextColor
DeleteDC
CreateDIBSection
CreateFontA
GetDeviceCaps
SetBkColor
DeleteObject
SelectObject
CreateCompatibleDC
SetMapMode
SetTextAlign
ExtTextOutA
GetTextExtentPoint32A
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
shell32
ShellExecuteA
msvcr90
??2@YAPAXI@Z
_mbsnbcpy
_localtime64
__clean_type_info_names_internal
strncpy
_except_handler4_common
_crt_debugger_hook
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
free
_malloc_crt
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
ceil
_ftol
_finite
_CIacos
??3@YAXPAX@Z
_vsnprintf
_time64
clock
malloc
sprintf
memcpy
_CIsqrt
__CxxFrameHandler
memset
msvcp90
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXPBDHH@Z
Sections
_TEXT Size: 512B - Virtual size: 431B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ