C:\Users\Hamza\Desktop\Project BX1\danjsi2\danjsi\Release\JSInjector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3b058fb98482f0ae209f3a0d47858f76_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b058fb98482f0ae209f3a0d47858f76_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3b058fb98482f0ae209f3a0d47858f76_JaffaCakes118
-
Size
248KB
-
MD5
3b058fb98482f0ae209f3a0d47858f76
-
SHA1
b6e0c0274713a19e6e6716d74d22368c503f0995
-
SHA256
3de61fb4fd1229e719d0f9cf70edb5ccbf72401d24a5093605c911253cc5c9ab
-
SHA512
d56dfa3fbf05ac4a476381571e577d85aeacf442f3db0ddc3dd8d2814c854ca29b1e3c7846fc2159c890104d67f1e60d22608dc8ac2a8127e418fcbdcf3e1eb9
-
SSDEEP
3072:axjkKMHSiN4XNIhUwI93woqrfe4ox8utfJ6TBfYtsjNT8E5G2vvj:8kGiN43BuoEe4ox8utJ6TBOsjebej
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b058fb98482f0ae209f3a0d47858f76_JaffaCakes118
Files
-
3b058fb98482f0ae209f3a0d47858f76_JaffaCakes118.dll windows:5 windows x86 arch:x86
444729060909bb1720aee2e22c5a0028
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
WSAGetLastError
WSAStartup
socket
WSACleanup
htons
inet_addr
bind
WSASetLastError
ntohs
__WSAFDIsSet
select
accept
recv
send
connect
listen
closesocket
shlwapi
StrStrIA
PathStripPathW
StrStrA
urlmon
URLDownloadToCacheFileA
URLDownloadToCacheFileW
kernel32
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetModuleHandleA
GetConsoleCP
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
GetTickCount
GetLocaleInfoA
lstrcmpiA
lstrlenA
lstrlenW
GetProcAddress
InterlockedIncrement
InterlockedDecrement
SetThreadPriority
GetCurrentThread
WaitForSingleObject
GetCurrentProcessId
WaitForMultipleObjects
GetThreadPriority
Sleep
GetModuleHandleW
lstrcpynW
LocalFree
LoadLibraryW
CreateEventW
ExitProcess
lstrcmpiW
GetModuleFileNameW
DisableThreadLibraryCalls
SetProcessShutdownParameters
CloseHandle
SetStdHandle
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
CreateThread
TerminateThread
GetModuleFileNameA
CreateFileA
SetFilePointer
WriteFile
GetCurrentProcess
FlushInstructionCache
SetLastError
VirtualProtect
WideCharToMultiByte
QueryPerformanceCounter
VirtualFree
HeapDestroy
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
ReadFile
MultiByteToWideChar
GetStartupInfoA
GetFileType
GetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetProcessHeap
GetCurrentThreadId
SetHandleCount
HeapSize
TlsFree
GetStringTypeW
GetStringTypeA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetConsoleMode
user32
RegisterClassA
DefWindowProcW
CreateWindowExA
UnhookWindowsHookEx
PostMessageW
SetWindowsHookExW
CallNextHookEx
ShowWindow
GetMessageW
TranslateMessage
DispatchMessageW
SetTimer
UnregisterClassA
PostQuitMessage
advapi32
RegSetValueExW
RegOpenKeyW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCloseKey
shell32
ShellExecuteA
Exports
Exports
InstallHook
ReleaseHook
SetHook
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ