C:\BUILD_~1\jdk6_16\control\build\WINDOW~1\tmp\deploy\jqs\jqs_plugin\jqs_plugin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
347b478f3c039c10b5ed3c54866ad89c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
347b478f3c039c10b5ed3c54866ad89c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
347b478f3c039c10b5ed3c54866ad89c_JaffaCakes118
-
Size
152KB
-
MD5
347b478f3c039c10b5ed3c54866ad89c
-
SHA1
4d25baafe1e17b7863e1bd9f38ead37476a24f94
-
SHA256
54c1257afc4a42495b4b5c17db4cb9ecb4ee6dd40ce016ba263191521648ce1d
-
SHA512
278d155b950d50f21c38a684cc42edacceb19188e404f2dba73b9a411c86d7e0bd759ff8a23438da0c7f1ca72e25dea5064a499b0cd74338e447f5087dcc710d
-
SSDEEP
3072:fV2OJN3cV0b3ddXHWgBwcs/eSKgD2ED9ClcRvRfshWWcSkQiYuRi64Y1g:fwgNdb3LHWgBdsXv2ERyIRfshWb/QiBg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 347b478f3c039c10b5ed3c54866ad89c_JaffaCakes118
Files
-
347b478f3c039c10b5ed3c54866ad89c_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
e067fe60a2fcc9d84d6d368822d2b2e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
closesocket
WSACloseEvent
WSACleanup
WSAGetLastError
recv
send
accept
htonl
htons
WSAEventSelect
select
getsockname
connect
listen
bind
socket
WSASetEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSACreateEvent
WSAStartup
ole32
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
oleaut32
RegisterTypeLi
UnRegisterTypeLi
SysAllocString
SysStringLen
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysFreeString
msvcr71
_resetstkoflw
??_V@YAXPAX@Z
realloc
??_U@YAPAXI@Z
wcsncpy
__security_error_handler
__dllonexit
_onexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_initterm
memset
__CppXcptFilter
free
malloc
_strnicmp
exit
fflush
fprintf
time
localtime
strftime
_iob
fclose
fopen
_vsnprintf
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_beginthreadex
_errno
strerror
_purecall
_except_handler3
_endthreadex
fgets
tolower
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memmove
memchr
setlocale
_adjust_fdiv
kernel32
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
lstrcatA
lstrcpyA
DisableThreadLibraryCalls
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
LeaveCriticalSection
lstrcpynA
lstrcmpiA
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
MultiByteToWideChar
GetLocaleInfoA
GetACP
InterlockedExchange
SetErrorMode
GetVersionExA
GetSystemInfo
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentThread
GetCurrentProcess
WideCharToMultiByte
IsDBCSLeadByte
CreateFileA
GetLogicalDrives
QueryDosDeviceA
GetFullPathNameA
GetLongPathNameA
GetModuleFileNameA
GetThreadLocale
WaitForSingleObject
GetLastError
CloseHandle
user32
CharNextA
advapi32
AllocateAndInitializeSid
ReportEventA
RegisterEventSourceA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueA
OpenThreadToken
OpenProcessToken
GetTokenInformation
DeregisterEventSource
EqualSid
FreeSid
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shlwapi
PathFindExtensionA
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ