d:\thailand\890a\cprd32\AOL\misc\coreclient\axtrack\axtrack.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5f960e4223859648bf63727d1cdd6436_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f960e4223859648bf63727d1cdd6436_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5f960e4223859648bf63727d1cdd6436_JaffaCakes118
-
Size
168KB
-
MD5
5f960e4223859648bf63727d1cdd6436
-
SHA1
c8d7ba92864fc0c9628d2f181a9d22e4174837f5
-
SHA256
ff3ea1faa9ca323836c2775c7aca2e448f15bb3a1243b1061b08949b5d8a0345
-
SHA512
cbaa64fc62c7468654fdef8011316125d1d06eb34f32a678c9ce3efa4f6645e9ab2b1661fbacd8feb74176c1efc4531ea45e6c6c1305ad9db05f391ba27ddbda
-
SSDEEP
3072:zcbwWLEIBsiFiEez/a69bnOaClaWFhoWzmdr0POxjvjnMO8:z4w0EInw7bnOaIaWjoWzYAOxjp8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f960e4223859648bf63727d1cdd6436_JaffaCakes118
Files
-
5f960e4223859648bf63727d1cdd6436_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
d70539649580bc57a2d9d1cf5ee46271
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcp71
?_Nomemory@std@@YAXXZ
msvcr71
memset
_except_handler3
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
__CppXcptFilter
_adjust_fdiv
_initterm
_callnewh
_wcsnicmp
_snprintf
strrchr
strcat
strncpy
wcslen
wcscpy
wcscat
realloc
wcsncpy
__CxxFrameHandler
_CxxThrowException
memcpy
_resetstkoflw
malloc
_purecall
memcmp
??_V@YAXPAX@Z
free
??3@YAXPAX@Z
__security_error_handler
advapi32
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
user32
CharNextA
wsprintfA
kernel32
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
LoadLibraryA
GetProcAddress
FreeLibrary
IsDBCSLeadByte
lstrcatA
GetModuleFileNameA
WritePrivateProfileStringA
lstrcpynA
InterlockedDecrement
InterlockedIncrement
DisableThreadLibraryCalls
lstrcmpiA
lstrlenA
GetLastError
LeaveCriticalSection
EnterCriticalSection
lstrlenW
GetSystemTimeAsFileTime
MultiByteToWideChar
GetPrivateProfileIntA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
lstrcpyA
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
ole32
CreateBindCtx
MonikerRelativePathTo
MonikerCommonPrefixWith
CreateAntiMoniker
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateGenericComposite
StringFromCLSID
CLSIDFromString
StringFromGUID2
oleaut32
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VarUI4FromStr
UnRegisterTypeLi
shlwapi
PathFindExtensionA
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE