c:\938\follow-Record\Suffix\observe-element\force.pdb
Static task
static1
Behavioral task
behavioral1
Sample
900a62f1d821af1da2b5235e651057b062a9fd3c74002ac38218038f7e6b4ea4.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_ae98342ed899c8ec2d468cf675508e46039af9db21ecf52c82341d5a4deaf436
-
Size
553KB
-
MD5
a3aa4f007de91e10516196bf660e9372
-
SHA1
65e10a61b3214e75b829e937614da67bdeb28626
-
SHA256
ae98342ed899c8ec2d468cf675508e46039af9db21ecf52c82341d5a4deaf436
-
SHA512
6b11623a671a4d004a9742ced266d414471a76d289c5f1bea2bb25d518cfcf93ebc5d659cb7c515b407ba9d9d2da9cefb7b8dac10f0aadfd4c998fbfff1c2c77
-
SSDEEP
12288:Oz676RqULZ6Bu1aUI5UYhPFcz3OyeKzqOM1siT9:GDRqo6Bu4UI5hhPFcTXemjqT9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/900a62f1d821af1da2b5235e651057b062a9fd3c74002ac38218038f7e6b4ea4.dll
Files
-
JaffaCakes118_ae98342ed899c8ec2d468cf675508e46039af9db21ecf52c82341d5a4deaf436.zip
Password: infected
-
900a62f1d821af1da2b5235e651057b062a9fd3c74002ac38218038f7e6b4ea4.dll.dll windows:6 windows x86 arch:x86
7a79d10b1d4343a18a4f6e25e165b4ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetProcessHeap
CreateFileW
SetStdHandle
ReadConsoleW
WriteConsoleW
HeapSize
SetEndOfFile
SetEnvironmentVariableW
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
GetTimeZoneInformation
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
CreateSemaphoreA
GetSystemTimeAsFileTime
TlsGetValue
VirtualProtectEx
TlsAlloc
GetSystemDirectoryA
GetTempPathA
Sleep
GetCommandLineA
GetModuleHandleA
InitializeCriticalSection
SetSystemPowerState
EnterCriticalSection
VirtualProtect
GetModuleFileNameA
MultiByteToWideChar
GetLastError
FormatMessageW
WideCharToMultiByte
GetStringTypeW
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
GetProcAddress
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
GetCurrentThread
GetACP
GetStdHandle
GetFileType
CloseHandle
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
CreateProcessW
GetFileAttributesExW
WriteFile
GetConsoleCP
GetConsoleMode
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
ReadFile
SetFilePointerEx
HeapReAlloc
SetConsoleCtrlHandler
CreateThread
user32
SetFocus
GetCursorPos
RegisterClassExA
GetFocus
GetClassInfoExA
GetKeyNameTextA
GetWindowTextLengthA
CallWindowProcA
IsDlgButtonChecked
DestroyIcon
AppendMenuA
DrawIconEx
DrawEdge
gdi32
BitBlt
DeleteDC
CreatePen
DeleteObject
CreateDCA
GetObjectA
DPtoLP
ole32
OleUninitialize
OleSetContainedObject
OleInitialize
shlwapi
PathFindFileNameA
PathAddBackslashW
PathStripToRootA
dciman32
DCICreatePrimary
DCIOpenProvider
GetDCRegionData
DCISetDestination
DCICloseProvider
DCICreateOverlay
GetWindowRegionData
DCIEndAccess
WinWatchDidStatusChange
DCICreateOffscreen
DCISetSrcDestClip
DCIDestroy
DCIDraw
DCISetClipList
DCIEnum
DCIBeginAccess
WinWatchClose
Exports
Exports
Connectdark
Mindlake
Porthigh
Problemscale
WingGrass
Sections
.text Size: 545KB - Virtual size: 544KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 361KB - Virtual size: 361KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ