c:\886_Soon\slip\wrong\126\pull.pdb
Static task
static1
Behavioral task
behavioral1
Sample
387f24bf87926db742020021902c80b7_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
387f24bf87926db742020021902c80b7_JaffaCakes118
-
Size
708KB
-
MD5
387f24bf87926db742020021902c80b7
-
SHA1
e6e7718b875a84cb91217f90d09b24cdac60e36a
-
SHA256
a52055bbd8080327a589accea860cf70e3a79b35d7173c5305e92e3852843fe7
-
SHA512
6ca8e6fe88324d151b78f1ed6c4760327a5a4776244dc4d5ff620f5432c796a1746ca58d16a6c040b28d45b31436e38365deeaf7f5f3891d8fdb018e4d359711
-
SSDEEP
12288:F9bAcis08s7gQFMWC24/MFS+AWmdXWJIjJ5F3+DpEFs3H6v/+NoTNA:F1Dis0dFA24/MFSptoJKnx+NE23a3+NV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 387f24bf87926db742020021902c80b7_JaffaCakes118
Files
-
387f24bf87926db742020021902c80b7_JaffaCakes118.dll windows:6 windows x86 arch:x86
3a9ce6dbfabfc6032e0cfde571419746
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ResetEvent
GetCurrentDirectoryW
GetWindowsDirectoryW
LoadLibraryW
GetCurrentProcessId
CopyFileW
OpenMutexW
SetEvent
GetSystemDirectoryW
WaitForSingleObject
GetEnvironmentVariableW
GetModuleFileNameW
VirtualAlloc
VirtualFree
VirtualProtect
ExitProcess
CreateDirectoryW
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
InterlockedFlushSList
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
GetModuleHandleExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
SetStdHandle
HeapSize
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
CloseHandle
CreateFileW
WriteConsoleW
aclui
ord2
ord1
cryptui
CryptUIDlgViewCertificateW
CryptUIWizFreeDigitalSignContext
CryptUIWizImport
CryptUIDlgViewContext
CryptUIWizDigitalSign
CryptUIWizExport
Exports
Exports
AreSymbol
Cloudstream
Currentwheel
Determine
Gunlight
Humansurface
Wildpaint
Sections
.text Size: 431KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ