abhstract.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1240b5e789608544fe550a77b4a14452_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1240b5e789608544fe550a77b4a14452_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1240b5e789608544fe550a77b4a14452_JaffaCakes118
-
Size
58KB
-
MD5
1240b5e789608544fe550a77b4a14452
-
SHA1
158ed1cfdf8280eea0696cf7a8779d3830ced728
-
SHA256
7e96c047b533dda255971a0e0567069e03e83378db08165e075d64441f1b2c27
-
SHA512
049bfba966dd236d7d8c397ba07f8cdbf552bfdfb3dffcb608d2cf5518e46a17b3dac97d48bf013bf6696ebc52d8d0f1e83ab12b17f7dc3581329b111a4e13d1
-
SSDEEP
768:/hunt5dbA0LnQeQm7656g5c6vFTVDatrHEOHrqzu/xUTBVN/++uLxuaqQkCwjEzm:/huzb22mhmtjEOf+mxuCkLaY5d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1240b5e789608544fe550a77b4a14452_JaffaCakes118
Files
-
1240b5e789608544fe550a77b4a14452_JaffaCakes118.dll windows:4 windows x86 arch:x86
a30ad36b1fd513fc914bcd87eb3cea44
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetModuleHandleW
GetPrivateProfileSectionA
SetErrorMode
UnmapViewOfFile
WriteFile
HeapAlloc
GetFileSize
GetTickCount
GetTempPathA
SetUnhandledExceptionFilter
FindFirstFileA
FindFirstFileExA
ReadFile
SetFilePointer
GetFileAttributesA
GetCurrentProcess
LocalAlloc
GetProcessHeap
GetCurrentThreadId
OutputDebugStringA
GetCurrentProcessId
FindClose
CreateFileMappingA
GetTempFileNameA
GetModuleHandleA
SetLastError
GetPrivateProfileStringA
GetCurrentDirectoryA
CreateFileA
GetLastError
OpenProcess
GetFileInformationByHandle
RemoveDirectoryA
FindNextFileA
GetSystemTimeAsFileTime
UnhandledExceptionFilter
MapViewOfFile
CopyFileA
GetFullPathNameA
QueryPerformanceCounter
GetFileAttributesExA
DeleteFileA
FlushViewOfFile
SetEndOfFile
SetCurrentDirectoryA
GetProcAddress
ExpandEnvironmentStringsA
Sleep
FreeLibrary
HeapFree
CloseHandle
LocalFree
SetFileAttributesA
LoadLibraryA
TerminateProcess
user32
GetDesktopWindow
GetDC
FillRect
DestroyMenu
FindWindowA
GetClientRect
DestroyWindow
CreateMenu
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
ConvertStringSidToSidA
OpenProcessToken
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
gdi32
CreateSolidBrush
Exports
Exports
wvcgljgwb
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ