PolicMan.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae8d2b7b48de9b49c3a77ffc668127b7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae8d2b7b48de9b49c3a77ffc668127b7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ae8d2b7b48de9b49c3a77ffc668127b7_JaffaCakes118
-
Size
270KB
-
MD5
ae8d2b7b48de9b49c3a77ffc668127b7
-
SHA1
d215026712ec31bde18deb7ae7e48b1058a29079
-
SHA256
3bb10c0f6dab731dc3dc036d160e88ebd86a6c8ed7bc490ee98de69972b27d2e
-
SHA512
684f77129affac5f3571cc4df27e185d87d7f8525272bb53d1b6424891c649ce7711f133eb1f10f60cd92447e51fa8ef20f3d5576bf84e0f7ce6dd3cb2edf230
-
SSDEEP
6144:RkUMsU+IK0Bk0+MDun4aI8bNoc+VPW1RZ+qiBATuynFegg:70junrI8J0PORZjiBauMe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae8d2b7b48de9b49c3a77ffc668127b7_JaffaCakes118
Files
-
ae8d2b7b48de9b49c3a77ffc668127b7_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
80669d9c8b5e2f7ab1638f143a9df729
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcscat
wcslen
wcstoul
wcscpy
__CxxFrameHandler
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
_initterm
free
_vsnwprintf
_except_handler3
wcschr
_wtoi
swscanf
_itow
_wcsicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
_CxxThrowException
wcsncat
wcsncpy
wcspbrk
wcsstr
_vsnprintf
sscanf
atol
iswspace
asctime
localtime
time
wcstol
netapi32
DsRoleGetPrimaryDomainInformation
framedyn
?GetDMTF@WBEMTime@@QBEPAGH@Z
??4WBEMTime@@QAEABV0@ABU_SYSTEMTIME@@@Z
activeds
ord3
ord15
ole32
CoCreateInstance
StringFromGUID2
CoCreateGuid
CoImpersonateClient
CoRevertToSelf
CoInitializeEx
CoUninitialize
CoInitializeSecurity
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
oleaut32
VariantChangeTypeEx
SafeArrayGetElement
SafeArrayPutElement
SysReAllocString
VariantCopy
SafeArrayCreate
SafeArrayRedim
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
SafeArrayCopy
VariantClear
SysAllocStringByteLen
VariantInit
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
kernel32
GetFileAttributesW
CreateDirectoryW
ExpandEnvironmentStringsW
LocalFree
CreateMutexA
WriteFile
CreateFileW
Sleep
SetFilePointerEx
GetFileSizeEx
DeleteFileW
MoveFileW
GetSystemDirectoryW
ReleaseMutex
GetModuleFileNameW
GetCurrentThread
GetLastError
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
SetLastError
LCMapStringW
DisableThreadLibraryCalls
SetUnhandledExceptionFilter
lstrlenW
GetSystemTime
DeleteCriticalSection
LeaveCriticalSection
DebugBreak
EnterCriticalSection
CloseHandle
WaitForSingleObject
OpenEventW
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExW
RegCreateKeyExW
AddAce
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
MakeAbsoluteSD
RegDeleteValueW
LookupAccountNameW
GetTokenInformation
OpenProcessToken
RevertToSelf
RegOpenKeyW
GetSecurityDescriptorLength
InitializeSecurityDescriptor
GetSecurityDescriptorControl
OpenThreadToken
SetThreadToken
IsValidSid
MakeSelfRelativeSD
GetAclInformation
GetAce
InitializeAcl
LookupAccountSidW
CopySid
GetLengthSid
IsValidSecurityDescriptor
IsValidAcl
RegDeleteKeyW
RegCreateKeyW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
SetSecurityDescriptorControl
Exports
Exports
CreateADContainers
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 181KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ