C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\plugin\adapter\ns7\obj\jpioji.pdb
Static task
static1
Behavioral task
behavioral1
Sample
46104f63d51ba2f784664f0790c16b04_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46104f63d51ba2f784664f0790c16b04_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
46104f63d51ba2f784664f0790c16b04_JaffaCakes118
-
Size
140KB
-
MD5
46104f63d51ba2f784664f0790c16b04
-
SHA1
16a36b4bbc7581f0f76403681de743b6e2702e07
-
SHA256
4ab764d070ee2b1045d9b792d7ccf46969609a56b10208c147882b96a2b9ce76
-
SHA512
19024074833e379467599feedbc26c9e9a68a1d15744faff2c2dcf97991ee0f89dd2306082a4a1500ec681d8867cb2c5e437998f6adc194aad85a2727575491c
-
SSDEEP
3072:qhzukaMk4v0Gib2xKJSM0hC1QPUhUapVsJfNsyU39nWshR:qhzu/Mk48Gc2xKJSp/UhbpGTsz35Vv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46104f63d51ba2f784664f0790c16b04_JaffaCakes118
Files
-
46104f63d51ba2f784664f0790c16b04_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
da7a6b5dcd6692559b8c5fd926a1f1bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
kernel32
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetLastError
InterlockedIncrement
lstrcpyA
lstrlenA
GetModuleFileNameA
lstrcatA
DisableThreadLibraryCalls
InterlockedDecrement
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
ExitProcess
user32
CharNextA
ole32
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
shlwapi
PathFindExtensionA
msvcr71
_CxxThrowException
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
memset
realloc
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
malloc
_resetstkoflw
??_U@YAPAXI@Z
wcsncpy
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE