d:\VSS_Source\Setup\Source\AssistanceProject\BackOperHelper\output\BackOperHelper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
08d2672c7487e7d1b3a32672288869ba_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
08d2672c7487e7d1b3a32672288869ba_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
08d2672c7487e7d1b3a32672288869ba_JaffaCakes118
-
Size
108KB
-
MD5
08d2672c7487e7d1b3a32672288869ba
-
SHA1
a9b8a96f31377ca42175735f992f5b9879d680ea
-
SHA256
a43c59a2fbae46f06876807b0ced62144d7584a7df9540690383faef1eda2a8d
-
SHA512
fcccc53d46b96dcf0a466f51f0d641ddfce6cf5487907eb2933ebb51939c015625095c6d9079c59d6fe26d11bc9544725d89d9cc084b2210a39a9ebdd3b07be0
-
SSDEEP
1536:TEVsG+XUBRfk+eCvbVKHm3I97mnPjYrRTM0g6XR+YbstEZiXoDF8:AubtTaXIqPl0g6MestS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08d2672c7487e7d1b3a32672288869ba_JaffaCakes118
Files
-
08d2672c7487e7d1b3a32672288869ba_JaffaCakes118.dll windows:4 windows x86 arch:x86
522a45a2c88115fc23572de8cb73da22
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SystemTimeToFileTime
CreateFileA
GetLastError
CloseHandle
FindFirstFileA
SearchPathA
GetFileSize
DeleteFileA
GetLocalTime
SetFileAttributesA
CopyFileA
GetWindowsDirectoryA
Sleep
DeviceIoControl
GetShortPathNameA
GetTickCount
MultiByteToWideChar
FindResourceExW
LoadResource
LockResource
SizeofResource
GlobalFree
lstrcpyW
FindClose
FindResourceW
FindNextFileW
DeleteFileW
FreeLibrary
GetProcAddress
LoadLibraryW
FindFirstFileW
GetWindowsDirectoryW
GetEnvironmentVariableA
GetModuleFileNameW
FlushFileBuffers
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetCommandLineA
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
LoadLibraryA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
advapi32
StartServiceW
ChangeServiceConfigW
GetUserNameA
RegOpenKeyA
OpenSCManagerW
RegDeleteKeyA
RegOpenKeyExA
RegEnumKeyExA
CreateServiceA
CloseServiceHandle
StartServiceA
OpenServiceA
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegCreateKeyA
QueryServiceStatus
shell32
ShellExecuteW
ole32
CoCreateInstance
CoInitialize
CoUninitialize
user32
UnregisterClassA
Exports
Exports
CloseExistedDll
CloseExistedDllByRundll32
CreateTask
Install
Uninstall
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ