C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\plugin\eula\obj\eula.pdb
Static task
static1
Behavioral task
behavioral1
Sample
34695444cae75f57c7b89dc04ec33685_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34695444cae75f57c7b89dc04ec33685_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
34695444cae75f57c7b89dc04ec33685_JaffaCakes118
-
Size
68KB
-
MD5
34695444cae75f57c7b89dc04ec33685
-
SHA1
c7323917395e7f1091b27a0e6613d9f0946688e3
-
SHA256
cfdb24d1a7dcb02ff7e4e03f7f9f78e54ec813c9ef7dd8a2c0117761759b3192
-
SHA512
911e50bfc1bf32d472a033e8f4b4c0f7532f524addb715787d9ff47e1d1132f597b40fe58ca59ceeeef286e19c836b6621dafd84578b3a1d7e626fa758f0bcd4
-
SSDEEP
768:KOvHSl1zrmmK9tyBejV/Kytfx3obwaGrqPZrHkEzWSgTZ6Vxl9b:KmHSlVKXyBoVCytV6rGrqPZHk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34695444cae75f57c7b89dc04ec33685_JaffaCakes118
Files
-
34695444cae75f57c7b89dc04ec33685_JaffaCakes118.dll windows:4 windows x86 arch:x86
3ee295acc3649b92dc33a22a235332f3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
gdi32
GetStockObject
kernel32
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetCurrentProcessId
GetProcAddress
LoadLibraryA
SetEvent
CloseHandle
WaitForSingleObject
CreateThread
CreateEventA
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetLastError
lstrlenA
lstrcmpiA
ReadFile
CreateFileA
InterlockedIncrement
InterlockedDecrement
lstrcpynA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
GetTickCount
QueryPerformanceCounter
ExitProcess
GetSystemTimeAsFileTime
user32
DispatchMessageA
GetWindowThreadProcessId
DialogBoxParamA
GetDlgItem
IsDlgButtonChecked
SetFocus
IsWindowEnabled
EnableWindow
wsprintfA
SetWindowTextA
LoadStringA
MessageBoxA
EndDialog
CharNextA
CallWindowProcA
SendMessageA
PostThreadMessageA
PeekMessageA
WaitMessage
TranslateMessage
IsWindowVisible
EnumWindows
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
oleaut32
VarUI4FromStr
msvcr71
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
memset
??_U@YAPAXI@Z
realloc
__CxxFrameHandler
_CxxThrowException
_resetstkoflw
malloc
??_V@YAXPAX@Z
??3@YAXPAX@Z
free
_except_handler3
__security_error_handler
__CppXcptFilter
Exports
Exports
ShowEulaDialog
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE