D:\share\tao925\Release\tao925.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0765647b231aa7552f09fe91cd7a5e85_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0765647b231aa7552f09fe91cd7a5e85_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0765647b231aa7552f09fe91cd7a5e85_JaffaCakes118
-
Size
192KB
-
MD5
0765647b231aa7552f09fe91cd7a5e85
-
SHA1
161683f9fb1d68afbe7fb66cd123404e0a434a95
-
SHA256
c063054a4521a021e6e72e7a66aa224dab86cf2421d53ba8d41f00e03f85c983
-
SHA512
cd1dc1fb209941f6c8085b0361f005d180b3c43fa9632cf07d6daf53fe5556651c0d09754f603b55817fb1c62d4f6d2d11071f3ff43bb108bf0d55e7ad00cc3d
-
SSDEEP
3072:3GYgLV9eOwRFtFypHd5EecnD1OVzVOuEsQBeFQRn3UqkvD:NgLVOAHd5EecD10hKeQnkqoD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0765647b231aa7552f09fe91cd7a5e85_JaffaCakes118
Files
-
0765647b231aa7552f09fe91cd7a5e85_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
dfcf8865379121b6dce568a512ca8202
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
GetProcAddress
IsDBCSLeadByte
GetWindowsDirectoryA
LoadLibraryA
CloseHandle
WaitForSingleObject
CreateProcessA
GetLocalTime
CreateMutexA
GetPrivateProfileSectionA
SetEndOfFile
UnmapViewOfFile
FlushFileBuffers
GetDiskFreeSpaceExA
SetFilePointer
WideCharToMultiByte
GetFullPathNameA
QueryDosDeviceA
OpenFileMappingA
UnlockFile
GetFileAttributesA
SearchPathA
GetShortPathNameA
GetDriveTypeA
GetTempFileNameA
FlushViewOfFile
FindFirstFileA
SetThreadLocale
GetThreadLocale
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
LocalFree
ReadFile
WriteConsoleW
SetStdHandle
GetConsoleMode
MultiByteToWideChar
lstrlenW
GetModuleFileNameA
lstrlenA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
DeleteCriticalSection
InterlockedDecrement
GetBinaryTypeA
InterlockedIncrement
GetConsoleCP
GetStringTypeW
LoadLibraryW
CreateFileW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
HeapReAlloc
HeapDestroy
HeapCreate
EncodePointer
DecodePointer
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
HeapAlloc
HeapFree
GetCurrentThreadId
GetCommandLineA
Sleep
HeapSize
ExitProcess
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
LCMapStringW
WriteFile
GetStdHandle
GetModuleFileNameW
user32
IsCharAlphaNumericA
CharNextW
CharNextA
gdi32
GetTextCharsetInfo
advapi32
RegQueryInfoKeyW
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
ole32
CoTaskMemAlloc
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoTaskMemFree
oleaut32
VariantClear
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
RegisterTypeLi
SysAllocString
SysStringByteLen
VarUI4FromStr
SysFreeString
SysAllocStringByteLen
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ