RasDiag.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bd2cd5b06696f75634b71137bbbfe41a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd2cd5b06696f75634b71137bbbfe41a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bd2cd5b06696f75634b71137bbbfe41a_JaffaCakes118
-
Size
116KB
-
MD5
bd2cd5b06696f75634b71137bbbfe41a
-
SHA1
5bc4530afb162418ac7508f817454f81fbc7e639
-
SHA256
2e43fd82516e4ea7ee8b2f8ddafe0344bfb0b6f92738aec4a0bc64389a1b76fa
-
SHA512
1557c0cc8a00b91eaf7590fbf581fe0dff7279e409a5363c3ac4c4530e96252bb8a928af2dada9278f8fa3f467f71c3d1c6e13788939b756448fe34d3183ddef
-
SSDEEP
3072:lTIQhCAMYpc9os3Rzt7AX8lniIlqJN2GdS:dIQhCAMxos3Rp8X04mGd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd2cd5b06696f75634b71137bbbfe41a_JaffaCakes118
Files
-
bd2cd5b06696f75634b71137bbbfe41a_JaffaCakes118.dll regsvr32 windows:6 windows x86 arch:x86
4fddc62f9d4a7cd53eac42ee00240560
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcscat_s
wcsncpy_s
_callnewh
_CxxThrowException
memcpy_s
__CxxFrameHandler3
memset
memcpy
wcsncmp
_purecall
??0exception@@QAE@ABV0@@Z
_vsnwprintf
_vsnprintf
_XcptFilter
_initterm
_amsg_exit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
??0exception@@QAE@XZ
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
free
_except_handler4_common
realloc
_errno
_unlock
malloc
__dllonexit
_lock
_onexit
wcscpy_s
wcsnlen
ntdll
RtlIpv6AddressToStringW
RtlIpv4AddressToStringW
RtlIpv6StringToAddressW
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
UnhandledExceptionFilter
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetVersionExA
LocalAlloc
LocalFree
SetUnhandledExceptionFilter
GetCurrentThreadId
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetModuleFileNameW
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
SetThreadLocale
GetThreadLocale
CompareStringOrdinal
SetLastError
CloseHandle
GetCurrentThread
FormatMessageW
OutputDebugStringA
WideCharToMultiByte
advapi32
RegQueryInfoKeyW
OpenThreadToken
GetTokenInformation
GetLengthSid
RegEnumKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
user32
LoadStringW
UnregisterClassA
CharNextW
rasapi32
RasEnumDevicesW
RasEnumConnectionsW
RasEnumEntriesW
RasGetEntryPropertiesW
ole32
StringFromGUID2
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
shell32
SHGetFolderPathW
ws2_32
inet_addr
GetAddrInfoW
FreeAddrInfoW
WSAStartup
htons
WSACleanup
iphlpapi
GetIpAddrTable
GetAdaptersAddresses
GetBestInterfaceEx
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ