c:\886_Soon\slip\wrong\126\pull.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14bcfaa8f83de0d941d512f53c257103_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
14bcfaa8f83de0d941d512f53c257103_JaffaCakes118
-
Size
708KB
-
MD5
14bcfaa8f83de0d941d512f53c257103
-
SHA1
a1f38d75b7c8c0add0a4fc76fc2fbde08f5acdd8
-
SHA256
f8e65caf7f0e6996f5a956af9d4258273fe30185aa2b06d74b2fdd7ba33f1f85
-
SHA512
634516818f31c58342d3283faec4b611a334fce9013be9611b70aac289de0a5115a3f8dc688b3f1ad07c7d64a47565aa399d2259ed4285cd43568712111b7705
-
SSDEEP
12288:DsbAcis08s7gQFMWC24/MFS+AWmdXWJIjJ5F3+DpEFs3H6v/+xoTNp:DODis0dFA24/MFSptoJKnx+NE23a3+x4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 14bcfaa8f83de0d941d512f53c257103_JaffaCakes118
Files
-
14bcfaa8f83de0d941d512f53c257103_JaffaCakes118.dll windows:6 windows x86 arch:x86
3a9ce6dbfabfc6032e0cfde571419746
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ResetEvent
GetCurrentDirectoryW
GetWindowsDirectoryW
LoadLibraryW
GetCurrentProcessId
CopyFileW
OpenMutexW
SetEvent
GetSystemDirectoryW
WaitForSingleObject
GetEnvironmentVariableW
GetModuleFileNameW
VirtualAlloc
VirtualFree
VirtualProtect
ExitProcess
CreateDirectoryW
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
HeapSize
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
CloseHandle
CreateFileW
WriteConsoleW
aclui
ord2
ord1
cryptui
CryptUIDlgViewCertificateW
CryptUIWizFreeDigitalSignContext
CryptUIWizImport
CryptUIDlgViewContext
CryptUIWizDigitalSign
CryptUIWizExport
Exports
Exports
AreSymbol
Cloudstream
Currentwheel
Determine
Gunlight
Humansurface
Wildpaint
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ