c:\Users\x\Desktop\P7 Pub 2010\Binary\nt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
53752d83e34ef556350c6c1fae0b246c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
53752d83e34ef556350c6c1fae0b246c_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
53752d83e34ef556350c6c1fae0b246c_JaffaCakes118
-
Size
51KB
-
MD5
53752d83e34ef556350c6c1fae0b246c
-
SHA1
7000b080fd0c40e66e493aa4ceb384fbde255836
-
SHA256
af80f629bef49473efed8473047bc1c0ff6bdc5c73a79372b684e323b771e7ca
-
SHA512
ff181355bd4159d51737bfc7a356bef7b2b33aac4a250001470afff27a94e13aba33a3ceaeaff43f908dacf272a5e5d5c8ff06ba4a9366c0369212060fe0270a
-
SSDEEP
1536:9CYU9NRLa7U17bZ1rcPTsj/3nMOKtU/u:92R27yrcrsj/MOKtAu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53752d83e34ef556350c6c1fae0b246c_JaffaCakes118
Files
-
53752d83e34ef556350c6c1fae0b246c_JaffaCakes118.dll windows:5 windows x86 arch:x86
efb474f7bf3389b67340117bf248e154
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTickCount
VirtualProtect
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
Sleep
LoadLibraryA
CreateThread
VirtualQuery
FlushInstructionCache
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
InterlockedCompareExchange
InterlockedExchange
IsDebuggerPresent
user32
MessageBoxA
GetAsyncKeyState
shell32
ShellExecuteA
msvcp90
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
?open@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXPBDHH@Z
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
?clear@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?getline@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
vstdlib
RandomSeed
RandomFloat
msvcr90
_CIcos
_CIsin
_CIsqrt
__CxxFrameHandler3
sprintf
_CIatan2
strstr
malloc
memcpy
memset
_CIatan
mbstowcs
vsprintf
_CIacos
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??3@YAXPAX@Z
??0exception@std@@QAE@XZ
_invalid_parameter_noinfo
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
??2@YAPAXI@Z
memmove_s
atof
tolower
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
__clean_type_info_names_internal
_crt_debugger_hook
free
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ