acppage.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bb2fed2edf4fef63f108cc47b9db8edb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb2fed2edf4fef63f108cc47b9db8edb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bb2fed2edf4fef63f108cc47b9db8edb_JaffaCakes118
-
Size
38KB
-
MD5
bb2fed2edf4fef63f108cc47b9db8edb
-
SHA1
14b691dc310d26a5f638327ce41b7d3cd65a206e
-
SHA256
5da97b91fa369d021da506af908e5ebfe5ac2eb6f3a1b3096bd3f831f07bcb29
-
SHA512
88b3d56cfd5a36b93065a46b695e8bb67b92cc953d8c52898a65467c9d206290ad96d5345e9531b094160ea5f428891e2b388d9e3842f97ddf1b0134f6115810
-
SSDEEP
768:uTERvKYRgrpRqt6LuSBQ6qRD549AFlgsQAygevZD:FKsgFRqtAuS66q/49AwsQAygevZD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb2fed2edf4fef63f108cc47b9db8edb_JaffaCakes118
Files
-
bb2fed2edf4fef63f108cc47b9db8edb_JaffaCakes118.dll regsvr32 windows:6 windows x86 arch:x86
9dc396059509745dce5e957b04ff53af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_wcsicmp
memset
??_U@YAPAXI@Z
??2@YAPAXI@Z
malloc
??3@YAXPAX@Z
_XcptFilter
_initterm
_amsg_exit
_adjust_fdiv
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_wcsupr
wcsstr
_vsnwprintf
??_V@YAXPAX@Z
wcscat_s
wcsncpy_s
wcscpy_s
free
kernel32
CreateDirectoryW
GetModuleHandleW
CreateActCtxW
ReleaseActCtx
ActivateActCtx
FreeLibrary
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeactivateActCtx
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
GetModuleFileNameW
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
SetThreadLocale
GetThreadLocale
HeapAlloc
GetProcessHeap
DecodePointer
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
LocalFree
EncodePointer
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
HeapFree
CheckElevationEnabled
GetBinaryTypeW
GetVersionExA
InterlockedExchange
user32
GetDlgItem
EnableWindow
SetWindowLongW
GetSystemMetrics
GetParent
GetWindowLongW
SendMessageW
LoadStringW
SendDlgItemMessageW
UnregisterClassA
CharNextW
shlwapi
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
advapi32
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegCloseKey
shell32
ord155
SHParseDisplayName
DragQueryFileW
SHGetNameFromIDList
SHChangeNotify
ole32
HWND_UserFree
HWND_UserUnmarshal
ReleaseStgMedium
CoTaskMemFree
CoGetObject
CoCreateInstance
StringFromGUID2
CoCreateGuid
HWND_UserSize
HWND_UserMarshal
rpcrt4
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrOleFree
NdrStubForwardingFunction
NdrStubCall2
NdrOleAllocate
NdrDllRegisterProxy
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrDllUnregisterProxy
oleaut32
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
SysFreeString
sfc
SfcIsFileProtected
ntdll
NtOpenThreadToken
NtOpenProcessToken
NtClose
NtQueryInformationToken
RtlStringFromGUID
RtlFreeUnicodeString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
wer
WerReportAddFile
WerReportCloseHandle
WerReportSubmit
WerReportSetParameter
WerReportCreate
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 51B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ