C:\BUILD_~1\jdk6_20\control\build\WINDOW~1\tmp\sun\sun.awt\jawt\obj\jawt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5bdb7b8c030a2df8fc737fc22edad303_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5bdb7b8c030a2df8fc737fc22edad303_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5bdb7b8c030a2df8fc737fc22edad303_JaffaCakes118
-
Size
250KB
-
MD5
5bdb7b8c030a2df8fc737fc22edad303
-
SHA1
33ad01a19a3122b24a516fda58f36ac12b411fe5
-
SHA256
8b2b4837afd9a7efc4be1b01c97bf966c0fb45b7ca4ffdad81c2cf86bd6b3752
-
SHA512
2d4cb907dda89a41b8fb1a30ddb8c626cde4bdcfcc47ef1dbce6518627349709d338d27ffa9f69d0488c96f4f7676c780bffaa704afb5e8ed814a9b21661621b
-
SSDEEP
6144:q3hfOG5luVwL2Ai6fS0ridL5LmWSj6muWvX77jT3i:q3FOSluVwL5fSE0L5LvSjRjvv3i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bdb7b8c030a2df8fc737fc22edad303_JaffaCakes118
Files
-
5bdb7b8c030a2df8fc737fc22edad303_JaffaCakes118.dll windows:4 windows x86 arch:x86
b4df9e2eaab709a162b6f70da1d5a031
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
awt
_DSGetDrawingSurface@8
_DSFreeDrawingSurface@4
_DSLockAWT@4
_DSUnlockAWT@4
_DSGetComponent@8
msvcr71
_onexit
__dllonexit
_except_handler3
free
_initterm
malloc
_adjust_fdiv
__CppXcptFilter
kernel32
DisableThreadLibraryCalls
Exports
Exports
_JAWT_GetAWT@8
Sections
.text Size: 1024B - Virtual size: 922B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 906B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 166B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 245KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE