pdb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
378497091654961932ab64d13f4de53a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
378497091654961932ab64d13f4de53a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
378497091654961932ab64d13f4de53a_JaffaCakes118
-
Size
94KB
-
MD5
378497091654961932ab64d13f4de53a
-
SHA1
c09dcc3f332fdd35abd692dc284b4ecfbc373182
-
SHA256
ee3071bd514e6752b9245c458309702eb1a4cef74c16cb04a1ec2f66d92fdd3f
-
SHA512
76f743a519c13871c253439226177f82822138c492b6db7d3c42e835daa191b4cab781f3f588f125d9bc351aa20384d7d23920fa0c79e6259331ed7982478e16
-
SSDEEP
1536:7s52loeolNwE+LOPcmZBSoGNX0uRysnDdDQl5YUGjhxBvbYIQ:nVoEEpAx0uosJDjUGjhxFcJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 378497091654961932ab64d13f4de53a_JaffaCakes118
Files
-
378497091654961932ab64d13f4de53a_JaffaCakes118.dll windows:4 windows x86 arch:x86
e34f96db011b3828dfc7c568c0687e02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
Beep
OpenProcess
GetCurrentProcessId
lstrcmpA
MulDiv
LocalFree
Sleep
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
TerminateThread
WaitForSingleObject
CreateThread
CloseHandle
GetLocaleInfoA
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
HeapAlloc
GetProcessHeap
HeapFree
EnumCalendarInfoExA
ResumeThread
SetThreadPriority
Exports
Exports
mdma
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ