c:\886_Soon\slip\wrong\126\pull.pdb
Static task
static1
Behavioral task
behavioral1
Sample
16aee8875914c40bc38e2921bed36438_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
16aee8875914c40bc38e2921bed36438_JaffaCakes118
-
Size
708KB
-
MD5
16aee8875914c40bc38e2921bed36438
-
SHA1
541c6532a09f478e66cf1e0ad0729e8124468041
-
SHA256
a4c53a9d63c579f45deb3df1b63aa591bb9899a36a9adf8a685b6d4c65df4d24
-
SHA512
b93081ae841c621916aa4478581b556f567ea40a472bcf993cf3a0944bc197c8b8df204f49b120424092986c57e58d045dd63dfbc9676f5a673dd23adc759829
-
SSDEEP
12288:tebAcis08s7gQFMWC24/MFS+AWmdnWJIjJ5F3+DpEFs3H6v/+ZoTN0:tMDis0dFA24/MFSptIJKnx+NE23a3+ZN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 16aee8875914c40bc38e2921bed36438_JaffaCakes118
Files
-
16aee8875914c40bc38e2921bed36438_JaffaCakes118.dll windows:6 windows x86 arch:x86
50abbd9e7be34717c881202779a30647
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ResetEvent
GetCurrentDirectoryW
GetWindowsDirectoryW
LoadLibraryW
GetCurrentProcessId
CopyFileW
OpenMutexW
SetEvent
GetSystemDirectoryW
WaitForSingleObject
GetEnvironmentVariableW
GetModuleFileNameW
VirtualAlloc
VirtualFree
VirtualProtect
ExitProcess
CreateDirectoryW
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
HeapSize
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
CloseHandle
CreateFileW
WriteConsoleW
aclui
ord1
ord2
cryptui
CryptUIWizFreeDigitalSignContext
CryptUIDlgViewContext
CryptUIWizExport
CryptUIWizImport
CryptUIDlgViewCertificateW
CryptUIWizDigitalSign
Exports
Exports
AreSymbol
Cloudstream
Currentwheel
Determine
Gunlight
Humansurface
Wildpaint
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ