C:\BUILD_~1\jdk6_20\control\build\WINDOW~1\tmp\deploy\plugin\jpishare\obj\jpishare.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0da639fd87302eed70e9cc8110b758cc_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0da639fd87302eed70e9cc8110b758cc_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0da639fd87302eed70e9cc8110b758cc_JaffaCakes118
-
Size
220KB
-
MD5
0da639fd87302eed70e9cc8110b758cc
-
SHA1
0605ca769ac549d31ab3677397e73adeed95a208
-
SHA256
aadac10e99ce904b01372b0ee0e8c4a91612f8e6cfa67e1fc1c4e0d6f5569c93
-
SHA512
a2289297b53c2ef428c1b1a4b57724486d15342ac62a5808792c3fe806a7d6b395c41146fd948e51a384e97941d361cb058212555b5e10ab41574808fc12633a
-
SSDEEP
3072:uPQ5gj5JLXsFTVs/CAP/HgP2zj8BwcC+NZYbNmcx1C59831RSm3UBoujZqMNI4OG:uYej5ldCAPfgAj8BxC+E3UiSv2EkC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0da639fd87302eed70e9cc8110b758cc_JaffaCakes118
Files
-
0da639fd87302eed70e9cc8110b758cc_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
375938e3a5dbc56a3a838be815f5b0d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegCreateKeyA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumKeyA
gdi32
GetStockObject
shell32
ShellExecuteA
Shell_NotifyIconA
ShellExecuteExA
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrcpyA
lstrcpynA
lstrlenA
GetModuleFileNameA
SetEvent
CloseHandle
WaitForSingleObject
CreateThread
ResetEvent
CreateEventA
LeaveCriticalSection
EnterCriticalSection
GetEnvironmentVariableA
GetProcAddress
SetEnvironmentVariableA
lstrcatA
WriteConsoleA
GetStdHandle
FreeLibrary
FreeConsole
GetModuleHandleA
LoadLibraryA
FindClose
FindFirstFileA
GetWindowsDirectoryA
GlobalMemoryStatus
lstrcmpA
AllocConsole
MultiByteToWideChar
GetShortPathNameA
lstrcmpiA
WideCharToMultiByte
CreateFileA
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetLastError
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
IsDBCSLeadByte
GetLongPathNameA
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
ExitProcess
GetSystemTimeAsFileTime
user32
CharNextA
RegisterClassA
CreateWindowExA
ShowWindow
SetWindowLongA
GetMessageA
TranslateMessage
DispatchMessageA
GetWindowLongA
GetWindowRect
DefWindowProcA
PostQuitMessage
DestroyWindow
wsprintfA
MessageBoxA
CreatePopupMenu
AppendMenuA
SetMenuItemInfoA
GetCursorPos
SetForegroundWindow
FindWindowExA
PostMessageA
LoadImageA
LoadStringA
TrackPopupMenu
ole32
StringFromCLSID
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VarUI4FromStr
msvcr71
_CxxThrowException
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
memset
_splitpath
getenv
_stricmp
_local_unwind2
_resetstkoflw
fopen
atoi
fseek
fclose
fgetc
wcslen
??_U@YAPAXI@Z
sprintf
strstr
strtok
strncat
strrchr
_stat
vsprintf
strtol
strchr
strncmp
memmove
__security_error_handler
__CppXcptFilter
malloc
realloc
perror
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
_purecall
??2@YAPAXI@Z
__CxxFrameHandler
exit
_adjust_fdiv
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ