c:\299_Flow\him\bell_opposite\order\Most.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2901a3d99aeb6d2231f77ed1787a6a44.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_2901a3d99aeb6d2231f77ed1787a6a44
-
Size
604KB
-
MD5
2901a3d99aeb6d2231f77ed1787a6a44
-
SHA1
d5b8701ce4f615d0c9c427b060edfa398dd1df62
-
SHA256
a43b7c1fff94a3a2c9cda875dc21e5bc57819537d1f6b9f9b91271e895201638
-
SHA512
c3dd61e13fd28cf03400bccac710c4a3aa05e71fadaa9bb1e381a86c761f90c33a0c5c5ca8f6393c50e60b379c818d54c93cac384e5a2ee95ab6fefb9c52c578
-
SSDEEP
12288:9uIB/bwMtjp4CqwqyaXPLAfx38TW9DiWUT2tq017JGoLbqW/I:I6b4wqyaDA5sTWiXT2tq07G2v/I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_2901a3d99aeb6d2231f77ed1787a6a44
Files
-
JaffaCakes118_2901a3d99aeb6d2231f77ed1787a6a44.dll windows:4 windows x86 arch:x86
54afd981c141523b8c68b6a5bfed7202
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
CreateEventW
GetVersion
FindClose
FindNextFileW
FindFirstFileW
TlsAlloc
GetCurrentDirectoryW
VirtualProtectEx
GetSystemDirectoryW
FindFirstChangeNotificationW
GetWindowsDirectoryW
CompareStringW
CompareStringA
GetLocaleInfoW
HeapSize
GetTimeZoneInformation
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
RtlUnwind
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
Sleep
HeapAlloc
GetLastError
HeapFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetTimeFormatA
GetDateFormatA
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
SetEnvironmentVariableA
user32
BeginDeferWindowPos
DeferWindowPos
GetPropW
TranslateMessage
UnregisterHotKey
CreateMenu
RegisterWindowMessageW
winscard
SCardReconnect
SCardLocateCardsByATRW
SCardListReaderGroupsW
SCardIsValidContext
SCardGetStatusChangeW
SCardGetAttrib
SCardEstablishContext
SCardAccessStartedEvent
SCardForgetReaderW
SCardLocateCardsW
SCardControl
SCardListReadersW
SCardIntroduceReaderGroupW
SCardForgetReaderGroupW
SCardDisconnect
SCardAddReaderToGroupW
SCardEndTransaction
SCardBeginTransaction
SCardRemoveReaderFromGroupW
SCardReleaseStartedEvent
SCardIntroduceReaderW
SCardCancel
SCardConnectW
SCardLocateCardsA
SCardReleaseContext
Exports
Exports
Growother
Minute
WordForce
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 665KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ