d:\NPS_VSS_ROOT\NPS\bin\release\program files\NPSDCAGM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3ad2a563a59de84482817a31ecfe648a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ad2a563a59de84482817a31ecfe648a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3ad2a563a59de84482817a31ecfe648a_JaffaCakes118
-
Size
628KB
-
MD5
3ad2a563a59de84482817a31ecfe648a
-
SHA1
6ec84914c89ae3e2992a2167258aef5e5d028eb2
-
SHA256
0e224a39581add52298f27b02914fe03032690915288d25bad633786deeadf7a
-
SHA512
48d44a3497e682b86a7ea59b4194eda7b75239406b9c1391ea7c8719179cbfc8dc44709611a1f1b68d0c4e6659c7e7dfaa8737750f52c765f68e7b280d17eb12
-
SSDEEP
12288:/Tw2jzgoD057hR7SjNJT00UYzkoH1lZPCE7bnjImwYAOxjpG:/Tw2jzgoDSL7ZbYzkoHzXjIFYg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ad2a563a59de84482817a31ecfe648a_JaffaCakes118
Files
-
3ad2a563a59de84482817a31ecfe648a_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
7de93ec899bfeddc948bc31ad3a93701
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
Sleep
lstrcpyA
CreateFileW
OutputDebugStringA
ReadFile
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryW
GetModuleFileNameW
FlushFileBuffers
OutputDebugStringW
DeleteFileW
GetThreadLocale
RaiseException
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
lstrlenA
QueryPerformanceFrequency
WriteFile
GetLastError
WideCharToMultiByte
MultiByteToWideChar
QueryPerformanceCounter
GetTimeZoneInformation
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapAlloc
HeapDestroy
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
SetLastError
InterlockedDecrement
GetProcessHeap
HeapFree
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetThreadLocale
lstrlenW
user32
MessageBoxW
wsprintfW
UnregisterClassA
shell32
SHGetSpecialFolderPathW
ole32
StringFromGUID2
OleRun
CoCreateInstance
CoCreateGuid
oleaut32
SafeArrayCopy
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
SetErrorInfo
VariantCopy
VariantChangeType
GetErrorInfo
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocStringLen
CreateErrorInfo
SysAllocStringByteLen
SysStringByteLen
SysFreeString
SysAllocString
VariantClear
VariantInit
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayGetVartype
atl80
ord23
ord58
ord61
ord31
ord15
ord18
ord22
ord30
ord32
ord64
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?assign@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_W0@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
msvcr80
wcscpy_s
__clean_type_info_names_internal
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
_encode_pointer
??3@YAXPAX@Z
memcpy_s
atoi
strstr
_strnicmp
isspace
strchr
_CxxThrowException
memmove_s
_mbsstr
_mbsinc
_ismbcspace
ceil
floor
??2@YAPAXI@Z
??_V@YAXPAX@Z
__CxxFrameHandler3
memcpy
strncmp
malloc
free
calloc
_recalloc
_vscprintf
vsprintf_s
iswspace
_wcsicmp
wcsstr
wcschr
wcsrchr
_wcsupr_s
_vscwprintf
vswprintf_s
_resetstkoflw
memset
_wtoi
_mbscmp
_timezone
_purecall
_localtime64_s
_time64
__RTDynamicCast
wcstok
wcsspn
_mbschr
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
realloc
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
_except_handler4_common
_unlock
__dllonexit
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetCLSID
Sections
.text Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE