d:\cm\build\public\ocp_basics_07-18-06\csi\projects\foundation\services\Basics\BasicsService\win\Release\Cod\basics.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2d350a828f4e03b07a19e3043236d0eb_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d350a828f4e03b07a19e3043236d0eb_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2d350a828f4e03b07a19e3043236d0eb_JaffaCakes118
-
Size
484KB
-
MD5
2d350a828f4e03b07a19e3043236d0eb
-
SHA1
b59e4550771c38caddaea712136b9ae986b581d8
-
SHA256
cb5c6160319a2fa6fa8da1247ef61f9f1c261bebc60db64f473f53bb42fb8665
-
SHA512
700f898cc57d11ef2aee9d934b42b672ebf1bd2504ae14695b9557e2d9477bdddeab74f91644375331b6672f9d1d0ff504c68e20d9b5ead2fd23e3ab5473dbf1
-
SSDEEP
6144:rCH0BSyN0Sfesd1bb64jGx3otxrSTwHpjwG1euQLkpqFfYnv5x8c:uH0+SWG1bm4yYDHu4eZLBF6vT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d350a828f4e03b07a19e3043236d0eb_JaffaCakes118
Files
-
2d350a828f4e03b07a19e3043236d0eb_JaffaCakes118.dll windows:4 windows x86 arch:x86
b93e2032f78e860b8898b8d4499a1917
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcessWorkingSetSize
SetProcessWorkingSetSize
MapViewOfFile
UnmapViewOfFile
GetLastError
CloseHandle
SetEvent
OpenProcess
ResetEvent
WaitForMultipleObjects
FreeLibrary
GetCurrentProcess
GetCurrentThreadId
ExitProcess
CompareStringA
InterlockedExchange
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
SetLastError
InterlockedCompareExchange
VirtualQuery
DisableThreadLibraryCalls
advapi32
RegCloseKey
user32
DestroyWindow
TranslateMessage
MsgWaitForMultipleObjects
PostQuitMessage
KillTimer
SetTimer
IsWindow
GetWindowThreadProcessId
ole32
CreateStreamOnHGlobal
CoUnmarshalInterface
CoCreateGuid
CoUninitialize
CoInitializeEx
CoCreateInstance
CreateBindCtx
CoTaskMemFree
StringFromCLSID
CoRegisterMessageFilter
CoMarshalInterface
oleaut32
VariantClear
VarCmp
VariantTimeToSystemTime
SysAllocString
VariantChangeType
VariantInit
SystemTimeToVariantTime
SafeArrayDestroy
SafeArrayCopy
SafeArrayUnlock
SafeArrayUnaccessData
SafeArrayGetElement
SafeArrayPutElement
SafeArrayLock
SafeArrayRedim
SafeArrayCreate
VariantCopy
xprt5
_XprtAllocString@4
_XprtCompareString@8
?GetNextValue@TPtrFromPtrMap@XPRT@@QAEAAPAXAAPAU__POSITION@2@@Z
?GetNextKey@TPtrFromPtrMap@XPRT@@QBEABQAXAAPAU__POSITION@2@@Z
?GetNextAssoc@TPtrFromPtrMap@XPRT@@QBEXAAPAU__POSITION@2@AAPAX1@Z
?GetStartPosition@TPtrFromPtrMap@XPRT@@QBEPAU__POSITION@2@XZ
?RemoveAll@TPtrFromPtrMap@XPRT@@QAEXXZ
?RemoveKey@TPtrFromPtrMap@XPRT@@QAE_NPAX@Z
?SetAt@TPtrFromPtrMap@XPRT@@QAEPAU__POSITION@2@PAX0@Z
?Lookup@TPtrFromPtrMap@XPRT@@QBE_NPAXAAPAX@Z
??1TPtrFromPtrMap@XPRT@@QAE@XZ
??0TPtrFromPtrMap@XPRT@@QAE@H@Z
_XprtHashString@4
_XprtFreeString@4
?TrimLeft@TBstr@XPRT@@QAEAAV12@G@Z
?ToDouble@TBstr@XPRT@@QBENXZ
?ToInt@TBstr@XPRT@@QBEHH@Z
?Compare@TBstr@XPRT@@QBEHPBG@Z
?Append@TBstr@XPRT@@QAEAAV12@PBDHPBG@Z
kUtf8Encoding
_XprtUrlEncode@8
_XprtUrlDecode@8
?AppendFormat@TBstr@XPRT@@QAAXPBGZZ
?Tokenize@TBstr@XPRT@@QBE?AV12@PBGAAH@Z
?Find@TBstr@XPRT@@QBEHGH@Z
?Attach@TBstr@XPRT@@QAEXPAG@Z
?Mid@TBstr@XPRT@@QBE?AV12@HH@Z
?Mid@TBstr@XPRT@@QBE?AV12@H@Z
?Empty@TBstr@XPRT@@QAEXXZ
?GetLength@TBstr@XPRT@@QBEHXZ
?GetTickCount@TTime@XPRT@@SA?AV12@XZ
?TestAccess@TFile@XPRT@@SA_NPBGI@Z
?Open@TFile@XPRT@@QAE_NPBGI_N@Z
_XprtFlipMem@8
?GetEncodedByteLength@TBstr@XPRT@@QBEHPBG@Z
?SetPosition@TMemStream@XPRT@@UAE_N_JH@Z
??1TMemStream@XPRT@@UAE@XZ
??0TMemStream@XPRT@@QAE@PBXH@Z
_XprtGetSystemInfo@0
_XprtEntityEscape@8
_XprtBase64ToBin@12
_XprtCanonicalizeScreenName@8
??3TXprtAllocated@XPRT@@SAXPAX@Z
_XprtBinToBase64@16
_XprtStringByteLen@8
xprt_memcmp
?OnExternalEntityRef@TXmlParser@XPRT@@MAE_NPBD000@Z
?OnDefault@TXmlParser@XPRT@@MAEXPBDH@Z
?OnEndCdataSection@TXmlParser@XPRT@@MAEXXZ
?Detach@TBstr@XPRT@@QAEPAGXZ
?OnComment@TXmlParser@XPRT@@MAEXPBD@Z
?OnProcessingInstruction@TXmlParser@XPRT@@MAEXPBD0@Z
?Go@TXmlParser@XPRT@@QAE_NXZ
??1TXmlParser@XPRT@@UAE@XZ
?FindOneOf@TBstr@XPRT@@QBEHPBG@Z
?Find@TBstr@XPRT@@QBEHPBGH@Z
?Replace@TBstr@XPRT@@QAEHPBG0@Z
?Set@TTime@XPRT@@QAEXN@Z
?CompareNoCase@TBstr@XPRT@@QBEHPBG@Z
?GetValue@TXmlAttributes@XPRT@@QBEPBDPBD0@Z
?Stop@TXmlParser@XPRT@@QAEXXZ
??0TXmlParser@XPRT@@QAE@AAVTStream@1@@Z
??0TBstr@XPRT@@QAE@PBDPBG@Z
?Unlock@TCritSec@XPRT@@QAEXXZ
?Lock@TCritSec@XPRT@@QAEXXZ
?Term@TCritSec@XPRT@@QAEXXZ
?Init@TCritSec@XPRT@@QAEXXZ
?FreeDataChain@SPlex@XPRT@@QAEXXZ
?Create@SPlex@XPRT@@SGPAU12@AAPAU12@II@Z
?Add@TPtrArray@XPRT@@QAEHPAX@Z
??1TPtrArray@XPRT@@QAE@XZ
??0TPtrArray@XPRT@@QAE@XZ
kSystemEncoding
_XprtAtomicTestAndSet@4
_XprtCreateThread@8
_XprtCompareNoCase@8
_XprtDestroyThread@8
_XprtAtomicIncrement@4
_XprtAtomicDecrement@4
?RemoveAt@TPtrArray@XPRT@@QAEXHH@Z
xprt_wcslen
?Append@TBstr@XPRT@@QAEAAV12@G@Z
_XprtGetMilliseconds@0
?Assign@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
xprt_strcmp
xprt_iswdigit
xprt_ucslcpy
?AppendFileNameToSpec@TFile@XPRT@@SA?AVTBstr@2@PBG0@Z
?DirSpecFromFullSpec@TFile@XPRT@@SA?AVTBstr@2@PBG@Z
?SetCount@TPtrArray@XPRT@@QAE_NHH@Z
?GetDigestSize@TMdXDigest@XPRT@@UBEHXZ
?Finish@TMdXDigest@XPRT@@UAEHPAEH@Z
??0TMessageDigest@XPRT@@QAE@XZ
?Transform@TMd5Digest@XPRT@@EAEXQAIQBE@Z
?Update@TMessageDigest@XPRT@@QAEXPBEH@Z
xprt_memcpy
xprt_strlen
_XprtInitialize@8
_XprtUninitialize@0
?Unlock@TSpinLock@XPRT@@QAEXXZ
?Lock@TSpinLock@XPRT@@QAEXXZ
?Set@TTime@XPRT@@QAEXHHHHHH@Z
?GetTm@TTime@XPRT@@QBE_NPAUtm@@@Z
??0TBstr@XPRT@@QAE@GH@Z
?TrimRight@TBstr@XPRT@@QAEAAV12@XZ
?TrimLeft@TBstr@XPRT@@QAEAAV12@XZ
??ATPtrFromPtrMap@XPRT@@QAEAAPAXPAX@Z
?SetOptimalLoad@TPtrFromPtrMap@XPRT@@QAEXMMM_N@Z
?IsOpen@TFile@XPRT@@QBE_NXZ
??1TFile@XPRT@@UAE@XZ
??0TFile@XPRT@@QAE@XZ
_XprtMemRealloc@8
?SetAtGrow@TPtrArray@XPRT@@QAEXHPAX@Z
_XprtStringLen@4
_XprtCompareLocale@12
?GetAt@TBstr@XPRT@@QBEGH@Z
?GetEncodedString@TBstr@XPRT@@QBEPBDPBG@Z
?Assign@TBstr@XPRT@@QAEAAV12@PBG@Z
?Format@TBstr@XPRT@@QAAXPBGZZ
xprt_memmove
??0TBstr@XPRT@@QAE@PBG@Z
??0TBstr@XPRT@@QAE@ABV01@@Z
??0TBstr@XPRT@@QAE@XZ
_XprtUtf8ToString@16
??1TBstr@XPRT@@QAE@XZ
?IsEmpty@TBstr@XPRT@@QBE_NXZ
?GetString@TBstr@XPRT@@QBEPBGXZ
?Assign@TBstr@XPRT@@QAEAAV12@ABV12@@Z
?Append@TBstr@XPRT@@QAEAAV12@PBG@Z
?Append@TBstr@XPRT@@QAEAAV12@ABV12@@Z
_XprtMemAlloc@4
xprt_memset
_XprtMemFree@4
?OnStartCdataSection@TXmlParser@XPRT@@MAEXXZ
?Left@TBstr@XPRT@@QBE?AV12@H@Z
msvcrt
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
_except_handler3
memcpy
_snwprintf
qsort
strcmp
_getpid
memset
memchr
memcmp
memmove
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
_stricmp
Exports
Exports
EEGetModuleInterop
Sections
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE