c:\stringice\nationease\BigSense\SouthSelf\look.pdb
Static task
static1
Behavioral task
behavioral1
Sample
90b03e7552b681f57da3cfffcb727b2d1f2d0167f4b5840f44f9a4b634c5b463.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_719be9664961e348c883ffd350702d7afd078798c6ade40d5f39eb5bcb3bdcbb
-
Size
140KB
-
MD5
f125bcfda8ea75323b987b7066d336fe
-
SHA1
cf10cafb54c656e168baaeb31768de9cbf0978ba
-
SHA256
719be9664961e348c883ffd350702d7afd078798c6ade40d5f39eb5bcb3bdcbb
-
SHA512
fa1cbceef187d07d08b5488cc0e2c1fcca36fea26e9dfdd7e9a3a8ab764d2253fb8d5ba956b73129da02289e06def86cd592a26cf7b660ec07292df54b8a6d0c
-
SSDEEP
3072:suVvydby4TkbeEPjEo4KOEumNXYP1/G/PBq6hQBN+fs:sb/FIjEo4KOE7YP1wFhQBkfs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/90b03e7552b681f57da3cfffcb727b2d1f2d0167f4b5840f44f9a4b634c5b463
Files
-
JaffaCakes118_719be9664961e348c883ffd350702d7afd078798c6ade40d5f39eb5bcb3bdcbb.zip
Password: infected
-
90b03e7552b681f57da3cfffcb727b2d1f2d0167f4b5840f44f9a4b634c5b463.dll regsvr32 windows:6 windows x86 arch:x86
fa2936d4e40e74b7c9617ed1dd57051f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VirtualProtect
GetLastError
Sleep
FindClose
CloseHandle
GetTickCount
TlsAlloc
TlsGetValue
CreateProcessA
GetStartupInfoA
GetWindowsDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
DecodePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapValidate
GetSystemInfo
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
HeapFree
HeapReAlloc
HeapSize
HeapQueryInformation
WriteFile
OutputDebugStringW
WriteConsoleW
GetTimeZoneInformation
GetStringTypeW
SetStdHandle
CreateFileW
winmm
waveOutWrite
waveOutPrepareHeader
waveOutClose
waveOutOpen
timeBeginPeriod
timeEndPeriod
Exports
Exports
Continuelaw
DllRegisterServer
Sections
.text Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ