decieriahpifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
129653e530513a717d83a4153b1da248_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
129653e530513a717d83a4153b1da248_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
129653e530513a717d83a4153b1da248_JaffaCakes118
-
Size
88KB
-
MD5
129653e530513a717d83a4153b1da248
-
SHA1
265323e0e670c88e7737b5ccd8f5f71b615c0e6b
-
SHA256
754234b9b42a2cb7e22642cf8f7184cf42464aef8655ebe2e35b410fe6149315
-
SHA512
0e868be20a860708db2253048da06676a2f757fd6480bc8b558100222768ca17cea9afbeb88734284fc42ca160fb6fd1fff94787ca9d7877b43459458e38ef9e
-
SSDEEP
1536:Kc7ekcTsLQfnMy/FYkBTp2+rb1yyswovcEUW:KmcbfMei6Im17lGL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 129653e530513a717d83a4153b1da248_JaffaCakes118
Files
-
129653e530513a717d83a4153b1da248_JaffaCakes118.dll windows:4 windows x86 arch:x86
da089da26bc7231a49daffaaacbcf2e8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetErrorMode
FindFirstFileExA
SetFileAttributesA
GetFileSize
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingA
GetFullPathNameA
Sleep
ReadFile
GetModuleHandleA
SetEndOfFile
OpenProcess
GetProcessHeap
GetTickCount
HeapAlloc
DeleteFileA
GetTempPathA
GetFileInformationByHandle
CloseHandle
GetCurrentDirectoryA
GetPrivateProfileSectionA
FindNextFileA
GetPrivateProfileStringA
FindClose
GetTempFileNameA
CopyFileA
RemoveDirectoryA
FindFirstFileA
SetCurrentDirectoryA
GetFileAttributesA
WriteFile
ExpandEnvironmentStringsA
GetFileAttributesExA
GetCurrentProcess
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
OutputDebugStringA
HeapFree
SetFilePointer
advapi32
EqualDomainSid
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
IsWellKnownSid
Exports
Exports
wbmsxuqr
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ