c:\savxp\build\symbols\Release\Security.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2986180c3edda417c9251e919f4c2384_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2986180c3edda417c9251e919f4c2384_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2986180c3edda417c9251e919f4c2384_JaffaCakes118
-
Size
120KB
-
MD5
2986180c3edda417c9251e919f4c2384
-
SHA1
e6cb34cf8a76435f0fcd8cb996b7622bbef568cb
-
SHA256
2a6c3a9188045bbcda0844ed69e81517600c230dd420a00e3775148d9d9f5855
-
SHA512
9359ab07f5771ec8f52bcf003e10dd6d88b8e936e311f1c32cae3867f8221cd7bdbc7ad46e788e569633916cd8d8e4c57b7fd3e5d5e4b632833d5417104013d8
-
SSDEEP
1536:vodg5DxBIXYhtvQe4pTTBxwkoLi/u+tkUoTefFrKO+bnp/h+PfhmZaASEhoeoOAa:EG8FVwp+tnPfFj+Tp/Anh0TaeoOAlScY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2986180c3edda417c9251e919f4c2384_JaffaCakes118
Files
-
2986180c3edda417c9251e919f4c2384_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
2996dfb0ee55b58df0a2d5d24d9f0884
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
netapi32
NetApiBufferFree
NetLocalGroupGetMembers
kernel32
HeapFree
SetThreadLocale
GetThreadLocale
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetCurrentThreadId
MultiByteToWideChar
SetLastError
GetProcAddress
LoadLibraryW
FreeLibrary
DeleteCriticalSection
TerminateProcess
InitializeCriticalSection
VerifyVersionInfoW
VerSetConditionMask
GetCurrentThread
LeaveCriticalSection
lstrlenW
LocalFree
EnterCriticalSection
HeapAlloc
GetProcessHeap
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FormatMessageW
InterlockedCompareExchange
Sleep
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
GetModuleFileNameW
GetCurrentProcess
RaiseException
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLastError
DuplicateHandle
user32
UnregisterClassA
advapi32
MakeAbsoluteSD
DuplicateToken
GetSecurityDescriptorOwner
OpenProcessToken
SetSecurityDescriptorOwner
IsValidSid
GetSecurityDescriptorSacl
GetSidSubAuthority
GetSecurityDescriptorControl
ConvertStringSidToSidW
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetAclInformation
InitializeAcl
AddAce
OpenThreadToken
SetSecurityDescriptorDacl
EqualSid
CopySid
LookupAccountSidW
GetLengthSid
CheckTokenMembership
GetTokenInformation
AccessCheck
GetSidLengthRequired
InitializeSid
GetSecurityDescriptorGroup
SetSecurityDescriptorGroup
SetThreadToken
ConvertSidToStringSidW
LookupAccountNameW
ole32
CoRevertToSelf
CoCreateInstance
CoImpersonateClient
oleaut32
SysStringByteLen
VarBstrCat
GetErrorInfo
LoadTypeLi
LoadRegTypeLi
VariantClear
VariantInit
VarBstrCmp
VariantChangeType
SysAllocStringByteLen
SysAllocString
SysFreeString
SysStringLen
SysAllocStringLen
atl80
ord25
ord61
ord15
ord18
ord22
ord64
ord58
ord31
ord32
ord23
userenv
UnloadUserProfile
msvcp80
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??$?M_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA_NABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
msvcr80
_amsg_exit
_adjust_fdiv
_initterm
_encoded_null
__CxxFrameHandler3
__clean_type_info_names_internal
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_malloc_crt
_except_handler4_common
__CppXcptFilter
??3@YAXPAX@Z
memcpy_s
??_V@YAXPAX@Z
_purecall
_vswprintf
free
calloc
??2@YAPAXI@Z
malloc
memmove_s
_resetstkoflw
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
swprintf_s
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@XZ
_wcsicmp
_CxxThrowException
memset
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_initterm_e
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ