acppage.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fca9a2a4cb0515665233ee9ecad17abc_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fca9a2a4cb0515665233ee9ecad17abc_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
fca9a2a4cb0515665233ee9ecad17abc_JaffaCakes118
-
Size
38KB
-
MD5
fca9a2a4cb0515665233ee9ecad17abc
-
SHA1
108b1c405027f29ea84e8a8c53e83e3b8e71016a
-
SHA256
785b24c30012445c20b9dd8842004bd66a04765cd0d2f55046f0be7fb86fef7e
-
SHA512
d030579defb776d1902bc7c8a62dfd16ed431ee93d81b3408bb3953d77a84eee93b85e3b3fa9a2e9bf43d4b64f0eccb97a8767fc22c84af1091882f9cb766dac
-
SSDEEP
768:uTERvKYRgrpRqt6LuSBQ6qRD549AFlgsQAygevZ5:FKsgFRqtAuS66q/49AwsQAygevZ5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fca9a2a4cb0515665233ee9ecad17abc_JaffaCakes118
Files
-
fca9a2a4cb0515665233ee9ecad17abc_JaffaCakes118.dll regsvr32 windows:6 windows x86 arch:x86
9dc396059509745dce5e957b04ff53af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_wcsicmp
memset
??_U@YAPAXI@Z
??2@YAPAXI@Z
malloc
??3@YAXPAX@Z
_XcptFilter
_initterm
_amsg_exit
_adjust_fdiv
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_wcsupr
wcsstr
_vsnwprintf
??_V@YAXPAX@Z
wcscat_s
wcsncpy_s
wcscpy_s
free
kernel32
CreateDirectoryW
GetModuleHandleW
CreateActCtxW
ReleaseActCtx
ActivateActCtx
FreeLibrary
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeactivateActCtx
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
GetModuleFileNameW
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
SetThreadLocale
GetThreadLocale
HeapAlloc
GetProcessHeap
DecodePointer
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
LocalFree
EncodePointer
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
HeapFree
CheckElevationEnabled
GetBinaryTypeW
GetVersionExA
InterlockedExchange
user32
GetDlgItem
EnableWindow
SetWindowLongW
GetSystemMetrics
GetParent
GetWindowLongW
SendMessageW
LoadStringW
SendDlgItemMessageW
UnregisterClassA
CharNextW
shlwapi
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
advapi32
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegCloseKey
shell32
ord155
SHParseDisplayName
DragQueryFileW
SHGetNameFromIDList
SHChangeNotify
ole32
HWND_UserFree
HWND_UserUnmarshal
ReleaseStgMedium
CoTaskMemFree
CoGetObject
CoCreateInstance
StringFromGUID2
CoCreateGuid
HWND_UserSize
HWND_UserMarshal
rpcrt4
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrOleFree
NdrStubForwardingFunction
NdrStubCall2
NdrOleAllocate
NdrDllRegisterProxy
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrDllUnregisterProxy
oleaut32
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
SysFreeString
sfc
SfcIsFileProtected
ntdll
NtOpenThreadToken
NtOpenProcessToken
NtClose
NtQueryInformationToken
RtlStringFromGUID
RtlFreeUnicodeString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
wer
WerReportAddFile
WerReportCloseHandle
WerReportSubmit
WerReportSetParameter
WerReportCreate
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 51B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ