D:\depot_rmaExQfe1\public\reach\oak\target\x86\i486\NTANSI\retail\RMAFilt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7498493e949b702165f21ac51ee5e02e_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
7498493e949b702165f21ac51ee5e02e_JaffaCakes118
-
Size
624KB
-
MD5
7498493e949b702165f21ac51ee5e02e
-
SHA1
5e5b197cd1f173fb8d62d9c59a24fca997b19012
-
SHA256
44d20008fc41654681a6e7811c90a0b37a6f10007b2d2b676856bb49eb29d0fc
-
SHA512
fc8bf0d1abec3f5fdb1a61233b3fdb0c387affe1df92dca6945830ab640a215f778d69f88aa8bdfae4d67b8485dbec09b4c12be7deb7f5f8ef64c8bacd66211a
-
SSDEEP
12288:N/EAAmS+Jundb2LvJKz26abtj/qIOdIIuFk33WkdUpl1L1QO:N/EArS+IWvJKz26Q/qIqpuC33Hmpn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7498493e949b702165f21ac51ee5e02e_JaffaCakes118
Files
-
7498493e949b702165f21ac51ee5e02e_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
3f0dc954c7cece46fa38357d66f7d268
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
shell32
ShellExecuteA
ShellExecuteExA
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CLSIDFromString
IIDFromString
StringFromGUID2
StgOpenStorageOnILockBytes
oleaut32
SysStringLen
SysFreeString
VarBstrCat
VarBstrCmp
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
VariantCopy
LoadTypeLi
LoadRegTypeLi
DispCallFunc
VariantChangeType
VariantClear
VariantInit
SysStringByteLen
SysAllocStringByteLen
VarUI4FromStr
SysAllocStringLen
SysAllocString
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
VirtualQuery
CreateFileA
LCMapStringW
LCMapStringA
ReadFile
SetStdHandle
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetLocaleInfoW
GetOEMCP
IsBadCodePtr
IsBadReadPtr
CloseHandle
SetFilePointer
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcmpiA
lstrcpyA
lstrcpynA
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
Sleep
GetFullPathNameA
LoadLibraryA
LocalFree
FormatMessageW
LockResource
InterlockedCompareExchange
GetProcAddress
GetTickCount
QueryPerformanceCounter
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
QueryPerformanceFrequency
GetCurrentProcessId
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
SetEndOfFile
ExitProcess
RtlUnwind
HeapReAlloc
GetCommandLineA
GetCPInfo
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
TerminateProcess
GetCurrentProcess
SetLastError
SetUnhandledExceptionFilter
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
GetStringTypeA
GetStringTypeW
FlushFileBuffers
advapi32
RegSetValueExA
RegDeleteValueA
GetUserNameA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
user32
CharNextA
GetSysColor
GetForegroundWindow
GetWindowRect
SetWindowTextA
GetParent
ShowWindow
GetWindowLongA
GetWindow
GetDesktopWindow
SendMessageA
MapWindowPoints
urlmon
CreateURLMoniker
Exports
Exports
?SetInterface@@YGJPAUIDataRepository@@@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 304KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 276KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE