d:\thailand\890a\cprd32\AOL\misc\coreclient\jiti\jiti.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ad122d3c0c2e2d97bc0ceaf8f2d2fb58_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad122d3c0c2e2d97bc0ceaf8f2d2fb58_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ad122d3c0c2e2d97bc0ceaf8f2d2fb58_JaffaCakes118
-
Size
152KB
-
MD5
ad122d3c0c2e2d97bc0ceaf8f2d2fb58
-
SHA1
01cb1a9238f0df0c88404725233a2ad6c5e7823f
-
SHA256
66955135a0c05e74313af51a2eb14b25a2613678cda78a8bb425c73f05afbb0e
-
SHA512
0448a997a3c333e86239abd26587da50725129bfad0afcfe5bd99c995f66998a535e21bad4aad6d88ae1c65b7fbbd268140578a499cb7c04fccd5898eb177ae5
-
SSDEEP
3072:ScD+UoUuJlmhY+gFiEez/a69bnOaClaWFhoWzmdr0POxjvjnMO8:ScDVmma7w7bnOaIaWjoWzYAOxjp8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad122d3c0c2e2d97bc0ceaf8f2d2fb58_JaffaCakes118
Files
-
ad122d3c0c2e2d97bc0ceaf8f2d2fb58_JaffaCakes118.dll windows:4 windows x86 arch:x86
da414d467fdf409781db6c9fc662bfed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
supersub
ord131
ord978
ord1605
ord1606
ord408
ord410
ord541
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_Xran@_String_base@std@@QBEXXZ
?resize@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
?length@?$char_traits@D@std@@SAIPBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?_Nomemory@std@@YAXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
msvcr71
memcmp
strlen
strchr
atoi
malloc
_callnewh
free
_initterm
_adjust_fdiv
__CppXcptFilter
_except_handler3
__lconv_init
??1type_info@@UAE@XZ
__dllonexit
_onexit
?terminate@@YAXXZ
wcslen
memcpy
memset
strcpy
??_V@YAXPAX@Z
_vsnprintf
_access
??3@YAXPAX@Z
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_CxxThrowException
__CxxFrameHandler
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
user32
CharNextA
LoadStringA
kernel32
GetSystemDirectoryA
GetWindowsDirectoryA
lstrcatA
lstrcpyA
lstrcpynA
lstrcmpA
lstrlenA
GetModuleHandleA
GetLastError
SizeofResource
FindResourceA
Exports
Exports
IsFiletypeInstalled
IsMimetypeInstalled
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE