C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\plugin\adapter\ns7\obj\jpioji.pdb
Static task
static1
Behavioral task
behavioral1
Sample
09950d129cb8a46a78e4d313f87ad087_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
09950d129cb8a46a78e4d313f87ad087_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
09950d129cb8a46a78e4d313f87ad087_JaffaCakes118
-
Size
64KB
-
MD5
09950d129cb8a46a78e4d313f87ad087
-
SHA1
ce0d345fb15abf178257b6ef4de5f57e697a1e2e
-
SHA256
a068fc13747a89a79034b793ea8a0891d4f255f4474edd143a90b924a5db90a1
-
SHA512
4239011f9bf412a8818542858a9917efc36ee475eaeaf6e38d6c86949a96352ebe75277f8b80a16596622bc2169c3ca2112031e40501f39637ad8dff26d4830d
-
SSDEEP
1536:hhzuLIeIX+M7fAzUCkmhGib2VrV0ggWVMVWh:hhzukaMk4v0Gib2xKJSM0h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09950d129cb8a46a78e4d313f87ad087_JaffaCakes118
Files
-
09950d129cb8a46a78e4d313f87ad087_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
da7a6b5dcd6692559b8c5fd926a1f1bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
kernel32
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetLastError
InterlockedIncrement
lstrcpyA
lstrlenA
GetModuleFileNameA
lstrcatA
DisableThreadLibraryCalls
InterlockedDecrement
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
ExitProcess
user32
CharNextA
ole32
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
shlwapi
PathFindExtensionA
msvcr71
_CxxThrowException
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
memset
realloc
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
malloc
_resetstkoflw
??_U@YAPAXI@Z
wcsncpy
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ