c:\886_Soon\slip\wrong\126\pull.pdb
Static task
static1
Behavioral task
behavioral1
Sample
36aabde97ceb3d8a0957c7e1e0562496_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
36aabde97ceb3d8a0957c7e1e0562496_JaffaCakes118
-
Size
708KB
-
MD5
36aabde97ceb3d8a0957c7e1e0562496
-
SHA1
161582568c9758609c8b41dd6d2e7ee8bf871a4e
-
SHA256
6dcc647133f296fc08b96260bef17bb963d0bbd4b0048facdef57134fef80b62
-
SHA512
499d473179d76020e2be4987b7bcc56c09dee9ee0c1f6116a2d700bbe2b79e52f6279c383dc768adba996a26135003964a68a3d1e6b3a0672706724969963c73
-
SSDEEP
12288:vWbAcis08s7gQFMWC24/MFS+AWmdnWJIjJ5F3+DpEFs3H6v/+RoTNf:v0Dis0dFA24/MFSptIJKnx+NE23a3+R+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 36aabde97ceb3d8a0957c7e1e0562496_JaffaCakes118
Files
-
36aabde97ceb3d8a0957c7e1e0562496_JaffaCakes118.dll windows:6 windows x86 arch:x86
50abbd9e7be34717c881202779a30647
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ResetEvent
GetCurrentDirectoryW
GetWindowsDirectoryW
LoadLibraryW
GetCurrentProcessId
CopyFileW
OpenMutexW
SetEvent
GetSystemDirectoryW
WaitForSingleObject
GetEnvironmentVariableW
GetModuleFileNameW
VirtualAlloc
VirtualFree
VirtualProtect
ExitProcess
CreateDirectoryW
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
HeapSize
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
CloseHandle
CreateFileW
WriteConsoleW
aclui
ord1
ord2
cryptui
CryptUIWizFreeDigitalSignContext
CryptUIDlgViewContext
CryptUIWizExport
CryptUIWizImport
CryptUIDlgViewCertificateW
CryptUIWizDigitalSign
Exports
Exports
AreSymbol
Cloudstream
Currentwheel
Determine
Gunlight
Humansurface
Wildpaint
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ