c:\886_Soon\slip\wrong\126\pull.pdb
Static task
static1
Behavioral task
behavioral1
Sample
35453e00e4eef03ac0468aa2bbe1e838_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
35453e00e4eef03ac0468aa2bbe1e838_JaffaCakes118
-
Size
708KB
-
MD5
35453e00e4eef03ac0468aa2bbe1e838
-
SHA1
bbcf63640be1b76e4db42d77aa081af197c5cb96
-
SHA256
6fa75ad9a5ce354a15f28b5a10181ab5b1fb6345f3f34a190fe8caede852ef5e
-
SHA512
663635859baecc9e3cf1747ee939c61bb707b54ebc274d305bd7f9edfd80ce76ff3ab4d26e8f5786fac4e5156cf89f8c7cbaa002f863fae96b5b3c91b84ec306
-
SSDEEP
12288:FkbAcis08s7gQFMWC24/MFS+AWmdnWJIjJ5F3+DpEFs3H6v/+VoTNn:FWDis0dFA24/MFSptIJKnx+NE23a3+Vq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 35453e00e4eef03ac0468aa2bbe1e838_JaffaCakes118
Files
-
35453e00e4eef03ac0468aa2bbe1e838_JaffaCakes118.dll windows:6 windows x86 arch:x86
50abbd9e7be34717c881202779a30647
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ResetEvent
GetCurrentDirectoryW
GetWindowsDirectoryW
LoadLibraryW
GetCurrentProcessId
CopyFileW
OpenMutexW
SetEvent
GetSystemDirectoryW
WaitForSingleObject
GetEnvironmentVariableW
GetModuleFileNameW
VirtualAlloc
VirtualFree
VirtualProtect
ExitProcess
CreateDirectoryW
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
HeapSize
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
CloseHandle
CreateFileW
WriteConsoleW
aclui
ord1
ord2
cryptui
CryptUIWizFreeDigitalSignContext
CryptUIDlgViewContext
CryptUIWizExport
CryptUIWizImport
CryptUIDlgViewCertificateW
CryptUIWizDigitalSign
Exports
Exports
AreSymbol
Cloudstream
Currentwheel
Determine
Gunlight
Humansurface
Wildpaint
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ