d:\cm\build\public\ocp_basics_07-18-06\csi\projects\foundation\services\Basics\BasicsService\win\Release\Cod\basics.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b37e6b4362f4f639ec464603627e4318_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b37e6b4362f4f639ec464603627e4318_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b37e6b4362f4f639ec464603627e4318_JaffaCakes118
-
Size
488KB
-
MD5
b37e6b4362f4f639ec464603627e4318
-
SHA1
0c9b8b534e6abc49a9faa7224b96e119084076a1
-
SHA256
cc304a2baa7f70134be2917de9c5167096bdd6dc59b01de9c606be913aa5c3ea
-
SHA512
5d9130a6dfd4a2ee6e3727b4f2cbeac4c04346aff2412d5ff12b24946dea5bfc9c7e713db463b8bd5a68e08aade13b83d8e308151750b7355351884b1e3f5282
-
SSDEEP
12288:eH0+SWG1bm4yYDFCQa+92+4lw++++++++++++++++++++YnAOeBI+++++++++++z:eH0NbSYhCQa+92+4lw+++++++++++++S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b37e6b4362f4f639ec464603627e4318_JaffaCakes118
Files
-
b37e6b4362f4f639ec464603627e4318_JaffaCakes118.dll windows:4 windows x86 arch:x86
b93e2032f78e860b8898b8d4499a1917
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcessWorkingSetSize
SetProcessWorkingSetSize
MapViewOfFile
UnmapViewOfFile
GetLastError
CloseHandle
SetEvent
OpenProcess
ResetEvent
WaitForMultipleObjects
FreeLibrary
GetCurrentProcess
GetCurrentThreadId
ExitProcess
CompareStringA
InterlockedExchange
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
SetLastError
InterlockedCompareExchange
VirtualQuery
DisableThreadLibraryCalls
advapi32
RegCloseKey
user32
DestroyWindow
TranslateMessage
MsgWaitForMultipleObjects
PostQuitMessage
KillTimer
SetTimer
IsWindow
GetWindowThreadProcessId
ole32
CreateStreamOnHGlobal
CoUnmarshalInterface
CoCreateGuid
CoUninitialize
CoInitializeEx
CoCreateInstance
CreateBindCtx
CoTaskMemFree
StringFromCLSID
CoRegisterMessageFilter
CoMarshalInterface
oleaut32
VariantClear
VarCmp
VariantTimeToSystemTime
SysAllocString
VariantChangeType
VariantInit
SystemTimeToVariantTime
SafeArrayDestroy
SafeArrayCopy
SafeArrayUnlock
SafeArrayUnaccessData
SafeArrayGetElement
SafeArrayPutElement
SafeArrayLock
SafeArrayRedim
SafeArrayCreate
VariantCopy
xprt5
_XprtAllocString@4
_XprtCompareString@8
?GetNextValue@TPtrFromPtrMap@XPRT@@QAEAAPAXAAPAU__POSITION@2@@Z
?GetNextKey@TPtrFromPtrMap@XPRT@@QBEABQAXAAPAU__POSITION@2@@Z
?GetNextAssoc@TPtrFromPtrMap@XPRT@@QBEXAAPAU__POSITION@2@AAPAX1@Z
?GetStartPosition@TPtrFromPtrMap@XPRT@@QBEPAU__POSITION@2@XZ
?RemoveAll@TPtrFromPtrMap@XPRT@@QAEXXZ
?RemoveKey@TPtrFromPtrMap@XPRT@@QAE_NPAX@Z
?SetAt@TPtrFromPtrMap@XPRT@@QAEPAU__POSITION@2@PAX0@Z
?Lookup@TPtrFromPtrMap@XPRT@@QBE_NPAXAAPAX@Z
??1TPtrFromPtrMap@XPRT@@QAE@XZ
??0TPtrFromPtrMap@XPRT@@QAE@H@Z
_XprtHashString@4
_XprtFreeString@4
?TrimLeft@TBstr@XPRT@@QAEAAV12@G@Z
?ToDouble@TBstr@XPRT@@QBENXZ
?ToInt@TBstr@XPRT@@QBEHH@Z
?Compare@TBstr@XPRT@@QBEHPBG@Z
?Append@TBstr@XPRT@@QAEAAV12@PBDHPBG@Z
kUtf8Encoding
_XprtUrlEncode@8
_XprtUrlDecode@8
?AppendFormat@TBstr@XPRT@@QAAXPBGZZ
?Tokenize@TBstr@XPRT@@QBE?AV12@PBGAAH@Z
?Find@TBstr@XPRT@@QBEHGH@Z
?Attach@TBstr@XPRT@@QAEXPAG@Z
?Mid@TBstr@XPRT@@QBE?AV12@HH@Z
?Mid@TBstr@XPRT@@QBE?AV12@H@Z
?Empty@TBstr@XPRT@@QAEXXZ
?GetLength@TBstr@XPRT@@QBEHXZ
?GetTickCount@TTime@XPRT@@SA?AV12@XZ
?TestAccess@TFile@XPRT@@SA_NPBGI@Z
?Open@TFile@XPRT@@QAE_NPBGI_N@Z
_XprtFlipMem@8
?GetEncodedByteLength@TBstr@XPRT@@QBEHPBG@Z
?SetPosition@TMemStream@XPRT@@UAE_N_JH@Z
??1TMemStream@XPRT@@UAE@XZ
??0TMemStream@XPRT@@QAE@PBXH@Z
_XprtGetSystemInfo@0
_XprtEntityEscape@8
_XprtBase64ToBin@12
_XprtCanonicalizeScreenName@8
??3TXprtAllocated@XPRT@@SAXPAX@Z
_XprtBinToBase64@16
_XprtStringByteLen@8
xprt_memcmp
?OnExternalEntityRef@TXmlParser@XPRT@@MAE_NPBD000@Z
?OnDefault@TXmlParser@XPRT@@MAEXPBDH@Z
?OnEndCdataSection@TXmlParser@XPRT@@MAEXXZ
?Detach@TBstr@XPRT@@QAEPAGXZ
?OnComment@TXmlParser@XPRT@@MAEXPBD@Z
?OnProcessingInstruction@TXmlParser@XPRT@@MAEXPBD0@Z
?Go@TXmlParser@XPRT@@QAE_NXZ
??1TXmlParser@XPRT@@UAE@XZ
?FindOneOf@TBstr@XPRT@@QBEHPBG@Z
?Find@TBstr@XPRT@@QBEHPBGH@Z
?Replace@TBstr@XPRT@@QAEHPBG0@Z
?Set@TTime@XPRT@@QAEXN@Z
?CompareNoCase@TBstr@XPRT@@QBEHPBG@Z
?GetValue@TXmlAttributes@XPRT@@QBEPBDPBD0@Z
?Stop@TXmlParser@XPRT@@QAEXXZ
??0TXmlParser@XPRT@@QAE@AAVTStream@1@@Z
??0TBstr@XPRT@@QAE@PBDPBG@Z
?Unlock@TCritSec@XPRT@@QAEXXZ
?Lock@TCritSec@XPRT@@QAEXXZ
?Term@TCritSec@XPRT@@QAEXXZ
?Init@TCritSec@XPRT@@QAEXXZ
?FreeDataChain@SPlex@XPRT@@QAEXXZ
?Create@SPlex@XPRT@@SGPAU12@AAPAU12@II@Z
?Add@TPtrArray@XPRT@@QAEHPAX@Z
??1TPtrArray@XPRT@@QAE@XZ
??0TPtrArray@XPRT@@QAE@XZ
kSystemEncoding
_XprtAtomicTestAndSet@4
_XprtCreateThread@8
_XprtCompareNoCase@8
_XprtDestroyThread@8
_XprtAtomicIncrement@4
_XprtAtomicDecrement@4
?RemoveAt@TPtrArray@XPRT@@QAEXHH@Z
xprt_wcslen
?Append@TBstr@XPRT@@QAEAAV12@G@Z
_XprtGetMilliseconds@0
?Assign@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
xprt_strcmp
xprt_iswdigit
xprt_ucslcpy
?AppendFileNameToSpec@TFile@XPRT@@SA?AVTBstr@2@PBG0@Z
?DirSpecFromFullSpec@TFile@XPRT@@SA?AVTBstr@2@PBG@Z
?SetCount@TPtrArray@XPRT@@QAE_NHH@Z
?GetDigestSize@TMdXDigest@XPRT@@UBEHXZ
?Finish@TMdXDigest@XPRT@@UAEHPAEH@Z
??0TMessageDigest@XPRT@@QAE@XZ
?Transform@TMd5Digest@XPRT@@EAEXQAIQBE@Z
?Update@TMessageDigest@XPRT@@QAEXPBEH@Z
xprt_memcpy
xprt_strlen
_XprtInitialize@8
_XprtUninitialize@0
?Unlock@TSpinLock@XPRT@@QAEXXZ
?Lock@TSpinLock@XPRT@@QAEXXZ
?Set@TTime@XPRT@@QAEXHHHHHH@Z
?GetTm@TTime@XPRT@@QBE_NPAUtm@@@Z
??0TBstr@XPRT@@QAE@GH@Z
?TrimRight@TBstr@XPRT@@QAEAAV12@XZ
?TrimLeft@TBstr@XPRT@@QAEAAV12@XZ
??ATPtrFromPtrMap@XPRT@@QAEAAPAXPAX@Z
?SetOptimalLoad@TPtrFromPtrMap@XPRT@@QAEXMMM_N@Z
?IsOpen@TFile@XPRT@@QBE_NXZ
??1TFile@XPRT@@UAE@XZ
??0TFile@XPRT@@QAE@XZ
_XprtMemRealloc@8
?SetAtGrow@TPtrArray@XPRT@@QAEXHPAX@Z
_XprtStringLen@4
_XprtCompareLocale@12
?GetAt@TBstr@XPRT@@QBEGH@Z
?GetEncodedString@TBstr@XPRT@@QBEPBDPBG@Z
?Assign@TBstr@XPRT@@QAEAAV12@PBG@Z
?Format@TBstr@XPRT@@QAAXPBGZZ
xprt_memmove
??0TBstr@XPRT@@QAE@PBG@Z
??0TBstr@XPRT@@QAE@ABV01@@Z
??0TBstr@XPRT@@QAE@XZ
_XprtUtf8ToString@16
??1TBstr@XPRT@@QAE@XZ
?IsEmpty@TBstr@XPRT@@QBE_NXZ
?GetString@TBstr@XPRT@@QBEPBGXZ
?Assign@TBstr@XPRT@@QAEAAV12@ABV12@@Z
?Append@TBstr@XPRT@@QAEAAV12@PBG@Z
?Append@TBstr@XPRT@@QAEAAV12@ABV12@@Z
_XprtMemAlloc@4
xprt_memset
_XprtMemFree@4
?OnStartCdataSection@TXmlParser@XPRT@@MAEXXZ
?Left@TBstr@XPRT@@QBE?AV12@H@Z
msvcrt
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
_except_handler3
memcpy
_snwprintf
qsort
strcmp
_getpid
memset
memchr
memcmp
memmove
_purecall
??2@YAPAXI@Z
??3@YAXPAX@Z
_stricmp
Exports
Exports
EEGetModuleInterop
Sections
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE