C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\plugin\jpishare\obj\jpishare.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4b211eabbd65a60eb3e2bdbab7c1e564_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b211eabbd65a60eb3e2bdbab7c1e564_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4b211eabbd65a60eb3e2bdbab7c1e564_JaffaCakes118
-
Size
130KB
-
MD5
4b211eabbd65a60eb3e2bdbab7c1e564
-
SHA1
c0ca16aa7b2f20e5d52ba5532a3e5b81931bd338
-
SHA256
96dea082cea980377ecf76742027f8bfe3c8b355bf3cc23675ebbcc7b9d81b74
-
SHA512
5d25e4b21aa4fda154af03047737ed8d635dcc0d79907667eadeb5115f3566cacc1a8b2a2c4cf408386d9a3216232442a4d77e31d31d739282b81cca177ddedb
-
SSDEEP
1536:MkQtn1RwpaX9/JdNnBaiVfNz2pjl8OHT7qjh3rmKPNRq4fEBm9uHZR:uNHHnBntNwlLHqjZqMNRq4fEBm9u5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b211eabbd65a60eb3e2bdbab7c1e564_JaffaCakes118
Files
-
4b211eabbd65a60eb3e2bdbab7c1e564_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
cbb2448265c8ccc4de2bf9154a176437
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegCreateKeyA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyExA
gdi32
GetStockObject
shell32
Shell_NotifyIconA
kernel32
ExitProcess
QueryPerformanceCounter
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
LocalFree
lstrcpyA
lstrcpynA
lstrlenA
WinExec
GetModuleFileNameA
SetEvent
CloseHandle
WaitForSingleObject
CreateThread
ResetEvent
CreateEventA
LeaveCriticalSection
EnterCriticalSection
GetEnvironmentVariableA
GetProcAddress
SetEnvironmentVariableA
lstrcatA
WriteConsoleA
GetStdHandle
FreeLibrary
FreeConsole
LoadLibraryA
GetModuleHandleA
FindClose
FindFirstFileA
GetWindowsDirectoryA
GlobalMemoryStatus
lstrcmpA
AllocConsole
MultiByteToWideChar
GetShortPathNameA
lstrcmpiA
WideCharToMultiByte
CreateFileA
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetLastError
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
IsDBCSLeadByte
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCurrentProcessId
user32
GetWindowRect
FindWindowExA
LoadStringA
LoadImageA
PostMessageA
CharNextA
RegisterClassA
CreateWindowExA
ShowWindow
SetWindowLongA
GetMessageA
TranslateMessage
DispatchMessageA
GetWindowLongA
MessageBoxA
DefWindowProcA
PostQuitMessage
DestroyWindow
wsprintfA
CreatePopupMenu
AppendMenuA
SetMenuItemInfoA
GetCursorPos
SetForegroundWindow
TrackPopupMenu
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
OleRun
oleaut32
VarUI4FromStr
VariantClear
VariantInit
SysAllocString
GetErrorInfo
msvcr71
strtok
strchr
strncmp
memmove
__security_error_handler
__CppXcptFilter
malloc
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
memset
getenv
_stricmp
_local_unwind2
_resetstkoflw
fopen
fclose
fgetc
wcslen
??_U@YAPAXI@Z
sprintf
strstr
strtol
strncat
strrchr
_stat
vsprintf
realloc
perror
exit
_CxxThrowException
??2@YAPAXI@Z
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
__CxxFrameHandler
_purecall
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ