C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\deploy\plugin\adapter\ns7\obj\jpioji.pdb
Static task
static1
Behavioral task
behavioral1
Sample
707131de762feb2c9a2310de89a19318_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
707131de762feb2c9a2310de89a19318_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
707131de762feb2c9a2310de89a19318_JaffaCakes118
-
Size
128KB
-
MD5
707131de762feb2c9a2310de89a19318
-
SHA1
70caf586a09232efdaad347bdd2f66a63b45d984
-
SHA256
8af100512e78acbe26e1ca2cb1f8fc89fc4794fb49b9d813d91fc575ce2f59ed
-
SHA512
dfbabd98cb82e97590da0bb9d9e7f9756a1a42ecf3f8e050a3b5f29e6c7e608d9179b28497c88e22e86d30155dcc722945b071e5794c1dcb1a7042eb1ae7a4fc
-
SSDEEP
3072:xhzukaMk4v0Gib2xKJSM0h38pkTF65aJfbIAuTfKJ:xhzu/Mk48Gc2xKJSp2pDKIXI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 707131de762feb2c9a2310de89a19318_JaffaCakes118
Files
-
707131de762feb2c9a2310de89a19318_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
da7a6b5dcd6692559b8c5fd926a1f1bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
kernel32
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetLastError
InterlockedIncrement
lstrcpyA
lstrlenA
GetModuleFileNameA
lstrcatA
DisableThreadLibraryCalls
InterlockedDecrement
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
ExitProcess
user32
CharNextA
ole32
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
shlwapi
PathFindExtensionA
msvcr71
_CxxThrowException
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
memset
realloc
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
malloc
_resetstkoflw
??_U@YAPAXI@Z
wcsncpy
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE