c:\Documents and Settings\Drew Benton\Desktop\Desktop\edxSilkroadLoader5_0_3c\src\Release\edxSilkroadDll5.pdb
Static task
static1
Behavioral task
behavioral1
Sample
51ed8a28b1da0e68c3bbcf52815e5e2f_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
51ed8a28b1da0e68c3bbcf52815e5e2f_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
51ed8a28b1da0e68c3bbcf52815e5e2f_JaffaCakes118
-
Size
289KB
-
MD5
51ed8a28b1da0e68c3bbcf52815e5e2f
-
SHA1
c1f42a418b2e703565f0ab9fa2e2bd7618daeb4c
-
SHA256
b755bcace4dfe31f49a202e38eed93e3200faee81c501b946cdee11302ea7500
-
SHA512
4f11287726f3513234b822cd77a0eee625c746dc08e23f77120eed1ecacfedac60d51a27fac5b1355bfc34ab266c09b3f54521a90c225fcd0489be5b99187d4f
-
SSDEEP
6144:qZGrCQgTD8wtm7V9TDE/2708z0cN0MKA:qIr04uS9U//8zWA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51ed8a28b1da0e68c3bbcf52815e5e2f_JaffaCakes118
Files
-
51ed8a28b1da0e68c3bbcf52815e5e2f_JaffaCakes118.dll windows:5 windows x86 arch:x86
8e029a776a4272f86113d95f4cf23afc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentProcess
QueryPerformanceCounter
InterlockedCompareExchange
GetCurrentThread
VirtualFreeEx
OpenThread
GetModuleFileNameA
CreateMutexA
GetCurrentThreadId
CreateFileA
FlushInstructionCache
GetProcAddress
VirtualProtect
CloseHandle
GetFullPathNameA
GetFileAttributesA
GetPrivateProfileStringA
WritePrivateProfileStringA
AllocConsole
FreeConsole
SetConsoleTitleA
GetStdHandle
CreateThread
GetLastError
ResumeThread
GetThreadContext
SetThreadContext
VirtualQuery
VirtualAlloc
SuspendThread
SetLastError
SetFilePointer
WriteFile
GetProcessHeap
SetEndOfFile
CreateFileW
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetModuleHandleA
LoadLibraryA
CreateDirectoryA
TerminateThread
GetTickCount
FreeLibrary
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
ExitProcess
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
HeapSize
FlushFileBuffers
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
SetStdHandle
GetFileType
ReadFile
GetCommandLineA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringA
LCMapStringW
SetHandleCount
GetStartupInfoA
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
HeapDestroy
VirtualFree
HeapReAlloc
GetConsoleCP
GetConsoleMode
user32
CreateWindowExA
ShowWindow
GetWindowTextA
TranslateMessage
DispatchMessageA
SetWindowTextA
MessageBoxA
GetDlgItem
GetActiveWindow
GetMessageA
CreateDialogParamA
GetClientRect
GetWindowTextLengthA
SendMessageA
IsDialogMessageA
gdi32
CreateFontA
DeleteObject
shell32
SHGetSpecialFolderPathA
ShellExecuteA
iphlpapi
GetAdaptersInfo
ws2_32
gethostbyname
bind
WSACleanup
ntohs
htons
WSAStartup
inet_ntoa
connect
Exports
Exports
Initialize
Sections
.text Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ