C:\TeamCity\buildAgent\work\1496be7243982c17\Build\Symbols\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b77286e622315cebf63a34fb65daadc1_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b77286e622315cebf63a34fb65daadc1_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
b77286e622315cebf63a34fb65daadc1_JaffaCakes118
-
Size
1.1MB
-
MD5
b77286e622315cebf63a34fb65daadc1
-
SHA1
df506501dc2a98f79f5f90cb1db84f3662459f57
-
SHA256
4f8145f271d108e0438da4ae2887677b85a001e969b59fb845512bce1ea144aa
-
SHA512
07bcba390ffed9a2ca03be5913fdece00482fb454155d02c2a569f08e043a73313a324876092ab161b7fbc9decc2cbe0207fd6d4436a4a53ec513762afa226c9
-
SSDEEP
24576:vbsG8X9qAXxhf8yXMYEunnBk00vR27e1d7W:AG8sAX7f8yXMYxnBk00vR27e1d7W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b77286e622315cebf63a34fb65daadc1_JaffaCakes118
Files
-
b77286e622315cebf63a34fb65daadc1_JaffaCakes118.dll windows:6 windows x86 arch:x86
40f2968db105f9120c3cfffa740423e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
d3d9
Direct3DCreate9
kernel32
GetModuleHandleW
LoadLibraryExW
LoadLibraryW
SetDllDirectoryW
CopyFileW
MoveFileW
GetCommandLineA
GetCommandLineW
CloseHandle
GetLastError
SetErrorMode
WaitForSingleObject
GetExitCodeProcess
ResumeThread
FreeLibrary
GetProcAddress
LoadLibraryExA
LoadLibraryA
K32EnumProcessModules
K32GetModuleFileNameExW
K32GetProcessMemoryInfo
VerSetConditionMask
GetCurrentDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesA
GetFullPathNameW
GetLongPathNameW
GetShortPathNameW
GetTempPathW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetSystemTime
GetLocalTime
GetModuleFileNameW
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
FormatMessageW
GetFileAttributesW
CreateToolhelp32Snapshot
Process32FirstW
GetModuleFileNameA
GetDiskFreeSpaceExA
GetLogicalDriveStringsW
QueryDosDeviceW
CreateMutexA
GetExitCodeThread
OpenProcess
GetSystemTimeAsFileTime
GetVersionExA
FileTimeToSystemTime
K32EnumProcesses
K32GetProcessImageFileNameW
Process32First
Process32Next
CreateProcessW
LocalAlloc
CreateProcessA
GetSystemDirectoryW
lstrcmpW
ExpandEnvironmentStringsW
lstrcmpA
OutputDebugStringW
CreateHardLinkW
GetConsoleMode
GetDiskFreeSpaceExW
DeleteFileW
CreateFileW
CreateDirectoryW
SetCurrentDirectoryW
SetDllDirectoryA
Sleep
HeapSize
WriteConsoleW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetStdHandle
HeapReAlloc
DecodePointer
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetConsoleCP
SetFileAttributesW
Process32NextW
RemoveDirectoryW
GetModuleHandleA
MoveFileA
IsWow64Process
TerminateProcess
ExitProcess
GetCurrentProcessId
GetCurrentProcess
RemoveDirectoryA
SetCurrentDirectoryA
SetFileAttributesA
WaitForSingleObjectEx
VerifyVersionInfoW
SetFilePointerEx
ReadConsoleW
GetACP
GetStringTypeW
HeapAlloc
HeapFree
GetModuleHandleExW
InterlockedFlushSList
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeviceIoControl
CreateSemaphoreW
GetProcessAffinityMask
SetThreadPriority
CreateThread
CreateEventW
RtlUnwind
RaiseException
EncodePointer
VirtualQuery
FlushInstructionCache
VirtualProtect
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
AreFileApisANSI
CompareStringW
MultiByteToWideChar
WideCharToMultiByte
GetCPInfo
IsDBCSLeadByte
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
GetStdHandle
FlushFileBuffers
GetFileType
ReadFile
SetEndOfFile
SetFilePointer
SetFileTime
WriteFile
GetVersionExW
SetEvent
ResetEvent
ReleaseSemaphore
UnhandledExceptionFilter
user32
GetMessageA
PeekMessageA
TranslateMessage
CharToOemBuffW
SetWindowPos
ShowWindow
DestroyWindow
PostMessageA
DispatchMessageA
CloseClipboard
GetWindowInfo
EnumThreadWindows
MessageBoxW
EmptyClipboard
SetClipboardData
OpenClipboard
FindWindowA
GetWindowRect
GetWindowTextA
SetWindowTextW
SetForegroundWindow
GetSystemMetrics
SendDlgItemMessageA
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
GetDlgItem
CreateDialogParamW
CreateDialogParamA
CharToOemA
OemToCharA
OemToCharBuffA
CharUpperW
CharLowerW
SendMessageA
gdi32
AddFontResourceExW
RemoveFontResourceExW
advapi32
RegDeleteValueW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegFlushKey
RegDeleteKeyA
RegCreateKeyExW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityW
shell32
ord155
SHOpenFolderAndSelectItems
ShellExecuteW
CommandLineToArgvW
ShellExecuteA
SHFileOperationW
ShellExecuteExW
SHGetFolderPathW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ord190
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
oleaut32
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocString
shlwapi
PathGetDriveNumberW
PathBuildRootW
winmm
timeGetTime
version
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoW
wintrust
WinVerifyTrust
Exports
Exports
DoWinMain
GetLibMtaVersion
Sections
.text Size: 646KB - Virtual size: 646KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 365KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ