c:\Comodo\CPILSuite\Cpil3\CPIL3dll\Release\CPIL3dll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
44997eb2ecc2dbeb31b6220d6deb8860_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44997eb2ecc2dbeb31b6220d6deb8860_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
44997eb2ecc2dbeb31b6220d6deb8860_JaffaCakes118
-
Size
184KB
-
MD5
44997eb2ecc2dbeb31b6220d6deb8860
-
SHA1
57b72ae6c605290c60f81daaaafc84c0b0b6cf4a
-
SHA256
13fb2a063d9cb59edb3f933037383ca7c9a094fa4f325c4875d72db44343e9a0
-
SHA512
9b490bd03fb4702ee959029253561f9c73f03e67001c3bb5d9d6bf22e4639bcc0ded649a0aa8eb5f3ee6e7ff9782ffcf9b19a5019803d29aba616a44aff1a60d
-
SSDEEP
3072:/P0ToYtHAus7zYTd72Ksu2md61z3l0iUCfwPWZiNvM1PihL2+N8ZlpQ:EToOgf7zY572KVdyrsLPN8VQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44997eb2ecc2dbeb31b6220d6deb8860_JaffaCakes118
Files
-
44997eb2ecc2dbeb31b6220d6deb8860_JaffaCakes118.dll windows:4 windows x86 arch:x86
e112c48dad6c8ca3c5cb15ab15b956b7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
GetVersion
lstrcmpiA
lstrlenW
lstrcmpiW
lstrlenA
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetCurrentThreadId
GetStartupInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
lstrcpyW
lstrcpyA
lstrcatW
WriteProcessMemory
WaitForSingleObject
WaitForMultipleObjects
VirtualQueryEx
VirtualQuery
VirtualProtectEx
VirtualProtect
TerminateThread
TerminateProcess
SetThreadPriority
SetLastError
SetEvent
ResumeThread
ReleaseMutex
ReadProcessMemory
ReadFile
OpenProcess
OpenMutexW
OpenMutexA
OpenFileMappingW
OpenFileMappingA
OpenEventW
OpenEventA
LoadLibraryExA
GetLastError
LoadLibraryA
IsBadWritePtr
IsBadReadPtr
GetVersionExW
GetTickCount
GetThreadContext
GetSystemDirectoryW
GetSystemDirectoryA
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetExitCodeThread
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
FormatMessageA
DuplicateHandle
DeleteFileW
CreateThread
CreateProcessW
CreatePipe
CreateMutexW
CreateMutexA
CreateFileMappingW
CreateFileMappingA
CreateFileW
CreateFileA
CreateEventW
CreateEventA
FlushFileBuffers
SetStdHandle
SetFilePointer
IsBadCodePtr
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetFileType
SetHandleCount
HeapCreate
GetStringTypeW
GetStringTypeA
RaiseException
MultiByteToWideChar
CreateProcessA
Sleep
WideCharToMultiByte
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetModuleFileNameA
GetCurrentProcessId
MapViewOfFile
CloseHandle
LoadLibraryW
UnmapViewOfFile
SetUnhandledExceptionFilter
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetSystemInfo
user32
DdeInitializeA
CloseDesktop
DispatchMessageA
GetThreadDesktop
GetUserObjectInformationA
MsgWaitForMultipleObjects
OpenInputDesktop
PeekMessageA
TranslateMessage
DdeUninitialize
GetKeyboardType
MessageBoxA
DdeClientTransaction
DdeCreateStringHandleA
DdeConnect
DdeGetLastError
DdeFreeStringHandle
DdeDisconnect
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
InitializeSecurityDescriptor
IsValidSid
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegSetValueExA
RegSetValueExW
SetSecurityDescriptorDacl
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetKernelObjectSecurity
ole32
CoTaskMemFree
StringFromCLSID
oleaut32
SysReAllocStringLen
SysFreeString
Exports
Exports
myWinEventProc
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CODE Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ