d:\work\projects\HookBrowsers\hb4\Release\btb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
13669ea561b346a9ecd300a2b8aa45bc_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
13669ea561b346a9ecd300a2b8aa45bc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
13669ea561b346a9ecd300a2b8aa45bc_JaffaCakes118
-
Size
120KB
-
MD5
13669ea561b346a9ecd300a2b8aa45bc
-
SHA1
e492cb1dc4283fc426a7d4b917e017a404ff1c55
-
SHA256
b298cb11b2b5b90bd547951df370a8599ba904f634b7ecf0163ce7edf777a529
-
SHA512
bd8e1f945004cea224ca87b36f1b04b102a9f9ad08956ae68f00eea1609081dc15795a0df7d79dbe7d5ed24358c9251400135fe2cc06902d8edf57837a2a5fe7
-
SSDEEP
1536:9NtX5MpoYHvE+K0ALaMeaBEblcVLT+6D8E4tuGLu2juQStp1FIK+:9zXC2YHvOKlc1T+iWL/jDStpwK+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13669ea561b346a9ecd300a2b8aa45bc_JaffaCakes118
Files
-
13669ea561b346a9ecd300a2b8aa45bc_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
dc7a3a7ceec571ce4fa25acc23b4e9de
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetThreadLocale
RaiseException
FlushFileBuffers
CloseHandle
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetThreadLocale
LoadLibraryA
DisableThreadLibraryCalls
GetProcessHeap
HeapAlloc
HeapReAlloc
HeapFree
lstrlenA
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
InitializeCriticalSection
GetLocaleInfoA
GetConsoleMode
GetConsoleCP
GetVersionExA
InterlockedExchange
GetACP
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetLastError
GetCurrentThreadId
GetCommandLineA
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCPInfo
GetOEMCP
WriteFile
GetStdHandle
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
Sleep
HeapSize
ExitProcess
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
user32
FindWindowExW
LockWindowUpdate
UnregisterClassA
wsprintfW
ole32
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
LoadRegTypeLi
SysStringLen
DispCallFunc
VariantClear
VariantInit
SysFreeString
LoadTypeLi
atl80
ord31
ord11
ord64
ord22
ord18
ord15
ord10
ord58
ord32
ord30
ord61
ord23
ws2_32
closesocket
send
connect
htons
socket
WSACleanup
recv
WSAGetLastError
WSAStartup
dnsapi
DnsRecordListFree
DnsQuery_A
urlmon
ObtainUserAgentString
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ