d:\users\Nick\_sb_\_gb\Release\crew.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b1ac7e706bc9d74d12dbf9e7e5f452e_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b1ac7e706bc9d74d12dbf9e7e5f452e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
1b1ac7e706bc9d74d12dbf9e7e5f452e_JaffaCakes118
-
Size
108KB
-
MD5
1b1ac7e706bc9d74d12dbf9e7e5f452e
-
SHA1
436f7b61fc76ee3b5666114488fcf3ede977066a
-
SHA256
0b6f6a2bd83b1f0f7e735759514cfb00dbf5f621dfa62d9e6a2eba8d1a3d5279
-
SHA512
b1bedb1dcf89048b628bba4355ffb4744d15f0cbd5da8d2052721db5d3bf19f437878994c188a38280ff16434ab945df3641f2307cdfa84e66c724aa670c145e
-
SSDEEP
1536:wUPxp/+ERLRFwO1R9YPVgKn6zYQ6yxlJDVHYHpN6TDQ7vA71MzLkAr2lB:wUP+EVRFwO1ReVg8Qf8JNWMzLxr2lB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b1ac7e706bc9d74d12dbf9e7e5f452e_JaffaCakes118
Files
-
1b1ac7e706bc9d74d12dbf9e7e5f452e_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
cfa22913ba293fc9824bc6507e737b5a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegFlushKey
SetSecurityInfo
SetEntriesInAclA
RegCreateKeyExA
RegEnumKeyExA
shlwapi
StrRChrA
urlmon
URLDownloadToCacheFileA
rpcrt4
RpcStringFreeA
UuidCreate
UuidToStringA
kernel32
SetEndOfFile
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LocalFree
lstrlenA
lstrcmpiA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetVolumeInformationA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetSystemDirectoryA
DeleteFileA
lstrlenW
CreateThread
GetOEMCP
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetSystemInfo
VirtualProtect
WriteFile
UnhandledExceptionFilter
GetLastError
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
HeapFree
GetCommandLineA
HeapAlloc
LCMapStringA
LCMapStringW
GetCPInfo
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualQuery
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
user32
EnumThreadWindows
SendMessageA
FindWindowExA
GetClassNameA
GetParent
oleaut32
VariantClear
VariantChangeType
VariantCopy
VariantInit
SysAllocString
SysFreeString
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ