c:\Documents and Settings\Serg\Рабочий стол\twoDLL\xvideoplugin_new_11 two dll plibd\Release\pllib.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1c168dc48abf5b896194c2d3f5827e85_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
1c168dc48abf5b896194c2d3f5827e85_JaffaCakes118
-
Size
296KB
-
MD5
1c168dc48abf5b896194c2d3f5827e85
-
SHA1
5dcaa568ecaedf69f32ceabb1bbe656d085fa667
-
SHA256
b47e2d6a2b7441b2ad2e0035476a0d75dd7a10002aad6e0bae9201031133eb00
-
SHA512
abbc8e62512037b82c1b799574837d77cb456d30f74d1b82f86b81c4c78362daef71c092560f3e24e7495fcf1f350799503d664b96f46f08531cb1a93e24a856
-
SSDEEP
3072:33KWbiLLJG8iZnFWBwF57uPCkUgpgt/VT+0r7f5dnKTASj3:3amiLLJvaFIad9g4VS0r7xK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c168dc48abf5b896194c2d3f5827e85_JaffaCakes118
Files
-
1c168dc48abf5b896194c2d3f5827e85_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
7b8969fd3447167e68f61f0a35d704bb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetTickCount
CloseHandle
WriteFile
CreateFileW
FreeLibrary
LoadLibraryExW
CreateThread
RaiseException
lstrcmpiW
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
MultiByteToWideChar
lstrlenW
SetThreadLocale
GetThreadLocale
GetVersionExW
WinExec
lstrlenA
GetProcAddress
LoadLibraryW
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleHandleW
GetLastError
GetLocaleInfoA
GetStringTypeW
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapSize
Sleep
SetLastError
GetOEMCP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetProcessHeap
GetVersionExA
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
TerminateProcess
GetCurrentProcess
user32
CharLowerA
CharNextW
MessageBoxW
UnregisterClassA
advapi32
IsTextUnicode
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
shell32
SHGetFolderPathW
ole32
CoTaskMemRealloc
CoTaskMemAlloc
CoGetClassObject
StringFromGUID2
CoCreateInstance
CoTaskMemFree
oleaut32
SysAllocStringLen
SysFreeString
VarBstrCmp
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysStringLen
LoadRegTypeLi
VarBstrCat
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
rpcrt4
NdrStubForwardingFunction
NdrOleFree
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrDllGetClassObject
NdrDllCanUnloadNow
NdrCStdStubBuffer2_Release
NdrDllRegisterProxy
NdrDllUnregisterProxy
wininet
HttpSendRequestW
InternetReadFile
InternetCloseHandle
InternetSetCookieW
HttpOpenRequestW
InternetCrackUrlW
InternetOpenW
InternetConnectW
InternetGetCookieW
urlmon
CoInternetGetSession
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
UnInstall
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 4KB - Virtual size: 576B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ