d:\Users\nobuo.nakata\fire06\6.5.x\Engines\Gecko_3.6\Firefox3.6\home\output\modules\libjar\zipwriter\src\zipwriter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4d46296e6e7be1c74cbec069810f4fd8_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4d46296e6e7be1c74cbec069810f4fd8_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4d46296e6e7be1c74cbec069810f4fd8_JaffaCakes118
-
Size
29KB
-
MD5
4d46296e6e7be1c74cbec069810f4fd8
-
SHA1
3d42ba1db4f83f388f414762588c7d3c341568d6
-
SHA256
d55f1a11bde2ac3dae141e88431573a77c49b97a37f9726731a99508de30ffc4
-
SHA512
879d9666d566f4a1c91816bf766e87aa3edab48d775e1092e9a1898e1dd4d16f0134c2bd0b9539b9159434bf28528c21995547550ecc1d4ea15a3b0a5a1e51e1
-
SSDEEP
384:QFI/8MCvtBHKlijgFEn5yoDfLmgOHTjdE299XVilY4cAQ76mUmV50Qxb:QFPMW0GgewiLmdjVilkAQ76mUAD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d46296e6e7be1c74cbec069810f4fd8_JaffaCakes118
Files
-
4d46296e6e7be1c74cbec069810f4fd8_JaffaCakes118.dll windows:5 windows x86 arch:x86
eed7eeb1feabbf01e6443f9ec11772ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
xpcom_core
?NS_NewGenericModule2@@YAIPBUnsModuleInfo@@PAPAVnsIModule@@@Z
??0nsCOMArray_base@@IAE@XZ
?AppendObject@nsCOMArray_base@@IAEHPAVnsISupports@@@Z
?Equals@nsACString_internal@@QBIHABV1@@Z
?Assign@nsACString_internal@@QAIXABVnsCSubstringTuple@@@Z
?SetLength@nsACString_internal@@QAIXI@Z
??0nsACString_internal@@IAE@XZ
?HashString@@YAIABVnsACString_internal@@@Z
PL_DHashTableFinish
??1nsCOMArray_base@@IAE@XZ
?Clear@nsCOMArray_base@@IAEXXZ
?RemoveObjectAt@nsCOMArray_base@@IAEHH@Z
@PL_DHashTableOperate@12
?assign_from_qi@nsCOMPtr_base@@QAIXVnsQueryInterface@@ABUnsID@@@Z
PL_DHashMoveEntryStub
??0nsTArray_base@@IAE@XZ
??1nsTArray_base@@IAE@XZ
?EnsureCapacity@nsTArray_base@@IAEHII@Z
?ShiftData@nsTArray_base@@IAEXIIII@Z
PL_DHashTableEnumerate
?PL_DHashStubEnumRemove@@YA?AW4PLDHashOperator@@PAUPLDHashTable@@PAUPLDHashEntryHdr@@IPAX@Z
PL_DHashFreeTable
PL_DHashAllocTable
PL_DHashFinalizeStub
PL_DHashTableInit
?assign_from_qi_with_error@nsCOMPtr_base@@QAIXABVnsQueryInterfaceWithError@@ABUnsID@@@Z
??1nsACString_internal@@QAE@XZ
?Assign@nsACString_internal@@QAIXABV1@@Z
?Assign@nsACString_internal@@QAIXPBDI@Z
??0nsACString_internal@@QAE@PADII@Z
??0nsCreateInstanceByContractID@@QAE@PBDPAVnsISupports@@PAI@Z
??1nsCOMPtr_base@@QAE@XZ
?assign_with_AddRef@nsCOMPtr_base@@QAIXPAVnsISupports@@@Z
?assign_from_helper@nsCOMPtr_base@@QAIXABVnsCOMPtr_helper@@ABUnsID@@@Z
?NS_TableDrivenQI@@YIIPAXPBUQITableEntry@@ABUnsID@@PAPAX@Z
nspr4
PR_AtomicIncrement
PR_AtomicDecrement
PR_LocalTimeParameters
PR_NormalizeTime
PR_ImplodeTime
PR_ExplodeTime
PR_GMTParameters
plc4
PL_strcasecmp
PL_strncasecmp
mozz
MOZ_Z_crc32
MOZ_Z_deflate
MOZ_Z_deflateInit2_
MOZ_Z_deflateEnd
mozcrt19
_except_handler4_common
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
_crt_debugger_hook
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_decode_pointer
_encoded_null
free
_malloc_crt
_encode_pointer
??_V@YAXPAX@Z
??_U@YAPAXI@Z
??2@YAPAXI@Z
??3@YAXPAX@Z
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DisableThreadLibraryCalls
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
Exports
Exports
NSGetModule
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ