C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\plugin\adapter\ns7\obj\jpioji.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3ce98bdb2db1328afba34b567abe2c6f_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ce98bdb2db1328afba34b567abe2c6f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3ce98bdb2db1328afba34b567abe2c6f_JaffaCakes118
-
Size
172KB
-
MD5
3ce98bdb2db1328afba34b567abe2c6f
-
SHA1
6fb9a4a23949e6bee680163269251684a50d8521
-
SHA256
35b7fb7eaae39036642475b7f977e5f926be64309f8fe8f48cb0056bad0a237a
-
SHA512
506e7f8a701b9f8b899761e30eea9a728285667edf59aadd6904354ee1c58605edec64091f90ed46d8c8ead0a98f17afd2e879fcaddb962b8fdb646136d1956e
-
SSDEEP
3072:+hzukaMk4v0Gib2xKJSM0h0K3BpeIFciV3jU4nEvlTaPxpg0Vi8KGLYoLm:+hzu/Mk48Gc2xKJSpGIKIFc0N4kEc1ni
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ce98bdb2db1328afba34b567abe2c6f_JaffaCakes118
Files
-
3ce98bdb2db1328afba34b567abe2c6f_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
da7a6b5dcd6692559b8c5fd926a1f1bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
kernel32
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetLastError
InterlockedIncrement
lstrcpyA
lstrlenA
GetModuleFileNameA
lstrcatA
DisableThreadLibraryCalls
InterlockedDecrement
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
ExitProcess
user32
CharNextA
ole32
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
shlwapi
PathFindExtensionA
msvcr71
_CxxThrowException
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
memset
realloc
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
malloc
_resetstkoflw
??_U@YAPAXI@Z
wcsncpy
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE