msfeedsbs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8c8fc21b6d49abb7d709f90d4c114d05_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c8fc21b6d49abb7d709f90d4c114d05_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8c8fc21b6d49abb7d709f90d4c114d05_JaffaCakes118
-
Size
222KB
-
MD5
8c8fc21b6d49abb7d709f90d4c114d05
-
SHA1
4444d0322e850d1402bd0ee8a4f2ab3868212c51
-
SHA256
37ceac9ae1e363ee08598a9601409783f8f40c91cb5199624df41f2a30be4ae2
-
SHA512
21f1e971c37737351815681b5fcb7ac83ca15bd71557cb041f9c331a5b8c644d3b32a32fd541d2c08b0aa7ad47c758961fe59dbf53dc2788e2bf325aa5896342
-
SSDEEP
6144:czBBfMuUd9KzG5J8euWjtRGIaw8Ct/TrChMFkzGi/l:czXfvUy6nbuWiw8Q/ChAkZd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c8fc21b6d49abb7d709f90d4c114d05_JaffaCakes118
Files
-
8c8fc21b6d49abb7d709f90d4c114d05_JaffaCakes118.dll windows:6 windows x86 arch:x86
78627d584eade82839d2c2c1b52605b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
??3@YAXPAX@Z
??2@YAPAXI@Z
_vsnwprintf
wcstoul
_purecall
wcsncmp
_wcsicmp
_wcsnicmp
bsearch
memmove
memcpy
_adjust_fdiv
_amsg_exit
_initterm
free
malloc
_XcptFilter
_vsnprintf
memset
kernel32
HeapFree
WaitForSingleObject
WriteFile
MultiByteToWideChar
SearchPathW
FindResourceW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
FreeLibrary
GetProcAddress
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
FindResourceExW
LoadResource
SetLastError
GetTickCount
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
CompareFileTime
lstrlenW
CreateProcessW
LoadLibraryA
RaiseException
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrlenA
WideCharToMultiByte
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLocaleInfoW
GetModuleFileNameW
GetVersionExW
GetProcessHeap
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
LocalFree
LocalAlloc
CloseHandle
GetLastError
CreateMutexW
ReleaseMutex
DeleteFileW
SetFileAttributesW
MoveFileExW
CreateFileW
GetSystemDirectoryW
FileTimeToSystemTime
SystemTimeToFileTime
GetCurrentProcess
advapi32
OpenProcessToken
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
TraceMessage
ImpersonateLoggedOnUser
CreateRestrictedToken
GetTokenInformation
ConvertSidToStringSidW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RevertToSelf
GetTraceEnableFlags
ole32
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoTaskMemFree
PropVariantClear
CLSIDFromString
CoTaskMemAlloc
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
HashData
SHStrDupW
PathAppendW
ord437
StrCmpNW
SHGetValueW
SHRegGetValueW
SHSetValueW
PathFindExtensionW
iertutil
ord48
ord79
ord74
ord81
ord85
ord9
secur32
GetUserNameExW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ