msado15.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5cbdaf97b6a83f39c7d64d6b0184209a_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5cbdaf97b6a83f39c7d64d6b0184209a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5cbdaf97b6a83f39c7d64d6b0184209a_JaffaCakes118
-
Size
596KB
-
MD5
5cbdaf97b6a83f39c7d64d6b0184209a
-
SHA1
a164c3edf556497b6a56a25f8b31203b7540c975
-
SHA256
7f9ca5d4b00d43f1f208eb2946e12488d2cb28f0ca4903456d9cd5374958fcda
-
SHA512
e5fab81cee7328d49cec9cc0820caf334fb57ad78f8e51c2fdc06de7ff48ea1f275495e8c69965b967211232c10d6cadf65346743e0514470a25460053b9642a
-
SSDEEP
12288:jfRseXXM4/9uMwgqYUUaYTxikmLddizOzpwM9XLmagi:jfRseXXp/9c5YUtYTxvBOzphLVg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cbdaf97b6a83f39c7d64d6b0184209a_JaffaCakes118
Files
-
5cbdaf97b6a83f39c7d64d6b0184209a_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
94ad4c0e71d0ed7b9aaa901d8d903619
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegCloseKey
kernel32
DeleteFileA
QueryPerformanceCounter
InitializeCriticalSection
DeleteCriticalSection
LCMapStringA
LCMapStringW
CompareStringW
EnterCriticalSection
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CompareStringA
GetCurrentProcessId
TlsFree
TlsAlloc
DisableThreadLibraryCalls
IsBadCodePtr
LoadLibraryA
HeapDestroy
WaitForSingleObject
GetCurrentProcess
ReadFile
GetFileTime
CreateFileW
lstrlenW
CreateFileA
GetFileType
WriteFile
GetProcAddress
FreeLibrary
Sleep
MultiByteToWideChar
WideCharToMultiByte
LeaveCriticalSection
CreateThread
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
CloseHandle
GetUserDefaultLCID
GetCurrentThreadId
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
TlsGetValue
GetLastError
TlsSetValue
msdart
lstrcmpiI
FXMemDetach
MpGetHeapHandle
FXMemAttach
_LoadVersionedResourceEx@16
MessageBoxI
GetWindowLongPtrI
GetWindowLongI
DeleteFileI
SetFileSecurityI
GetFileSecurityI
DefWindowProcI
GetModuleHandleI
LoadStringI
RegEnumKeyExI
GetWindowsDirectoryI
GetModuleFileNameI
lstrlenI
RegSetValueExI
RegQueryValueExI
RegOpenKeyExI
RegCreateKeyExI
RegDeleteKeyI
CharNextI
lstrcpyI
MpHeapReAlloc
_OnUnicodeSystem@0
GetFullPathNameI
GetTempFileNameI
LoadLibraryI
UMSEnterCSWraper
MpHeapAlloc
GetVersionExI
MPInitializeCriticalSection
MPDeleteCriticalSection
RegisterClassExI
CreateWindowExI
PostMessageI
UnregisterClassI
?ReadUnlock@CReaderWriterLock3@@QAEXXZ
?ReadLock@CReaderWriterLock3@@QAEXXZ
??1CReaderWriterLock3@@QAE@XZ
??0CReaderWriterLock3@@QAE@XZ
?WriteLock@CReaderWriterLock3@@QAEXXZ
?WriteUnlock@CReaderWriterLock3@@QAEXXZ
?ReadOrWriteLock@CReaderWriterLock3@@QAE_NXZ
?ReadOrWriteUnlock@CReaderWriterLock3@@QAEX_N@Z
MpHeapFree
lstrcatI
msvcrt
_onexit
__dllonexit
_adjust_fdiv
_initterm
sprintf
_wrename
rename
_waccess
_access
fseek
fwrite
fread
fclose
_get_osfhandle
_wfopen
fopen
_purecall
swprintf
wcslen
free
_wcsnicmp
wcsncat
_except_handler3
wcscpy
_wcsicmp
wcsncpy
wcschr
wcscat
malloc
iswalnum
iswalpha
memmove
_ftol
iswspace
wcsncmp
wcsstr
_ultow
_wtol
_HUGE
wcstod
wcscmp
realloc
ole32
StringFromCLSID
CoUnmarshalInterface
CreateStreamOnHGlobal
CoMarshalInterface
CoReleaseMarshalData
CoTaskMemAlloc
CoInitialize
CoUninitialize
CreateBindCtx
CreateFileMoniker
CoTaskMemFree
CoCreateInstance
CoCreateFreeThreadedMarshaler
oleaut32
SetErrorInfo
VariantChangeType
VariantClear
GetErrorInfo
LoadRegTypeLi
SysFreeString
VariantInit
SysAllocStringLen
SysStringLen
SysAllocString
SafeArrayUnlock
SafeArrayLock
VariantCopy
SafeArrayDestroy
SafeArrayRedim
SafeArrayCreate
SysStringByteLen
SafeArrayPutElement
SafeArrayGetElement
RegisterTypeLi
LoadTypeLi
CreateErrorInfo
OaBuildVersion
SysReAllocStringLen
SafeArrayCopy
user32
GetDesktopWindow
GetWindow
IsWindowVisible
GetWindowThreadProcessId
DispatchMessageW
PeekMessageW
DispatchMessageA
PeekMessageA
MsgWaitForMultipleObjects
TranslateMessage
DestroyWindow
GetActiveWindow
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RNIGetCompatibleVersion
com_ms_wfc_data_Field_getBoolean
com_ms_wfc_data_Field_getByte
com_ms_wfc_data_Field_getBytes
com_ms_wfc_data_Field_getDataTimestamp
com_ms_wfc_data_Field_getDouble
com_ms_wfc_data_Field_getFloat
com_ms_wfc_data_Field_getInt
com_ms_wfc_data_Field_getLong
com_ms_wfc_data_Field_getShort
com_ms_wfc_data_Field_getString
com_ms_wfc_data_Field_isNull
com_ms_wfc_data_Field_loadMsjava
com_ms_wfc_data_Field_setDataDate
Sections
.text Size: 412KB - Virtual size: 410KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdbid Size: 4KB - Virtual size: 556B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE