M:\ewdk\CommonAppData\Microsoft\HelpLibrary2\Catalogs\VisualStudio14\msvc.pdb
Behavioral task
behavioral1
Sample
8dde9b561ed4ac4e6786e22be7532ea2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8dde9b561ed4ac4e6786e22be7532ea2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8dde9b561ed4ac4e6786e22be7532ea2_JaffaCakes118
-
Size
767KB
-
MD5
8dde9b561ed4ac4e6786e22be7532ea2
-
SHA1
60dfe6d35f9a37503acc688a150dabfac460c0d1
-
SHA256
d893f26330906bedcad2627f41135f0fda65bc4dfe1f4186cd60d4546469b3c3
-
SHA512
244fd87c7d65d1d2fd29b61b513118fd806733e732ff70b9c94a536aa1211db4596302839e41cbda2eb59f04b29a47cd26c04ee66a2ada6e4b335b003aa79367
-
SSDEEP
12288:UPbNB91nFoMWDwF33DLPRyR0O7Xytq8JnjNmiaJ:UpVzLPRyRPkxji
Malware Config
Signatures
-
Detected Egregor ransomware 1 IoCs
resource yara_rule sample family_egregor -
Egregor family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dde9b561ed4ac4e6786e22be7532ea2_JaffaCakes118
Files
-
8dde9b561ed4ac4e6786e22be7532ea2_JaffaCakes118.dll regsvr32 windows:6 windows x86 arch:x86
a425f4f6fe723a4ffe990e4611c62d08
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
MessageBoxA
kernel32
GetModuleFileNameW
EncodePointer
GetCommandLineW
VirtualAlloc
Sleep
LoadLibraryW
GetProcAddress
CreateFileW
ExitProcess
VirtualQuery
VirtualFree
VirtualProtect
GetCurrentProcess
FlushInstructionCache
IsBadReadPtr
LoadLibraryA
FreeLibrary
lstrcmpA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
InterlockedPushEntrySList
InterlockedFlushSList
RaiseException
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
GetCurrentThread
GetACP
FindClose
FindFirstFileExA
FindFirstFileExW
FindNextFileA
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
GetProcessHeap
SetConsoleCtrlHandler
GetStringTypeW
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
HeapSize
HeapReAlloc
CloseHandle
SetFilePointerEx
WriteConsoleW
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
Exports
Exports
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 326KB - Virtual size: 326KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 379KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ