c:\savxp\build\symbols\Release\ICAdapter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8d9ff3dd0b30dd3acfe1df61ebd0622d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d9ff3dd0b30dd3acfe1df61ebd0622d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8d9ff3dd0b30dd3acfe1df61ebd0622d_JaffaCakes118
-
Size
131KB
-
MD5
8d9ff3dd0b30dd3acfe1df61ebd0622d
-
SHA1
945c22456d656498f01e63e38e9b629745823140
-
SHA256
43fff82c427aaf537e19df1514376aadfaf03009e867c860f56205cb558603c1
-
SHA512
1c2033486f2e685d0d6f5a8edb02a0007daa85cc648682e8ab9de15e93e92b1c28bf981e1144d57bffc9dcf9c7bbce30015e9cbf9464727bfb50a3f245f5a3be
-
SSDEEP
1536:bAR1afS46yhJKgz7vMIhHEZaX3kzMxoG8k6+PtZ2+4J7Q5hHMxlhUuhWvOA+737r:VxhJKS5qzMxoG8l+AQ5hHMxlmOA+73/X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d9ff3dd0b30dd3acfe1df61ebd0622d_JaffaCakes118
Files
-
8d9ff3dd0b30dd3acfe1df61ebd0622d_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
97f4b639454e19f5ae61eff3b4201718
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SetThreadLocale
GetVersionExW
GetFileAttributesW
FindResourceW
lstrlenA
SetThreadPriority
MultiByteToWideChar
SizeofResource
LockResource
GetThreadPriority
LoadResource
Sleep
FindResourceExW
CloseHandle
GetCurrentProcess
SetLastError
GetCurrentThread
GetCurrentProcessId
GetModuleHandleW
GetThreadLocale
HeapAlloc
FormatMessageW
InterlockedCompareExchange
RaiseException
GetSystemTimeAsFileTime
GetCurrentThreadId
CreateFileW
GetLastError
lstrlenW
InterlockedDecrement
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
InterlockedIncrement
DeviceIoControl
GetModuleFileNameW
HeapFree
SetUnhandledExceptionFilter
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
GetProcessHeap
GetProcAddress
user32
UnregisterClassA
advapi32
RevertToSelf
OpenThreadToken
SetThreadToken
ole32
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysAllocStringLen
SafeArrayGetDim
SysFreeString
LoadTypeLi
SafeArrayRedim
SafeArrayLock
SafeArrayUnlock
SafeArrayGetVartype
SafeArrayCopy
SafeArrayCreate
SafeArrayDestroy
VariantCopyInd
VariantClear
SafeArrayGetLBound
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringByteLen
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
SysAllocString
atl80
ord61
ord15
ord23
ord64
ord30
ord32
ord31
ord18
ord22
ord58
shlwapi
PathRemoveFileSpecW
PathFindExtensionW
msvcp80
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
?swap@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXAAV12@@Z
msvcr80
_decode_pointer
_onexit
_lock
_encode_pointer
?terminate@@YAXXZ
_unlock
memset
_CxxThrowException
_wcslwr_s
wcsstr
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__clean_type_info_names_internal
__CxxFrameHandler3
__dllonexit
free
??3@YAXPAX@Z
_purecall
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??2@YAPAXI@Z
??0exception@std@@QAE@XZ
?what@exception@std@@UBEPBDXZ
memmove_s
_set_invalid_parameter_handler
signal
_invalid_parameter
memcpy
??_V@YAXPAX@Z
wcsrchr
_wcsicmp
_recalloc
calloc
memcpy_s
_beginthreadex
malloc
wcsncpy
swprintf_s
userenv
UnloadUserProfile
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ