C:\Documents and Settings\crenoud\Desktop\SourceMTA\VOMBA\code\projets\contextuel_popper\exe\src\URLComponentFF3\ADVFF3Component\Release\ADVFF3Component.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c23521b0735ee1a48a2fe226a97d7332_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c23521b0735ee1a48a2fe226a97d7332_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c23521b0735ee1a48a2fe226a97d7332_JaffaCakes118
-
Size
203KB
-
MD5
c23521b0735ee1a48a2fe226a97d7332
-
SHA1
1035bbd7c8dbd80b55a5527ac4354f537c881996
-
SHA256
85b3e92eefbf45e3966dce759fcd876aefffbbe08ec8661e95c027e5e0121d46
-
SHA512
d2806b295a24ad5be1667f2785c3fffb53a2a5541ab4d4c5677fd8f93abfa38732c1cfb77cd8496c0d9e445e03a6216901a2a003087bd9a95b6980e1af908cec
-
SSDEEP
3072:pcPWJ8t6fkk+t1Mp64c8NzTfEM0b3IHTQirbgjWZ7lVQ5Jn:p2s8k+t1Y64c85fEl3IzzrEyZZVs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c23521b0735ee1a48a2fe226a97d7332_JaffaCakes118
Files
-
c23521b0735ee1a48a2fe226a97d7332_JaffaCakes118.dll windows:5 windows x86 arch:x86
8d560018d493bf40112688afff70950c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
xpcom
NS_CStringCloneData
NS_CStringContainerFinish
NS_CStringContainerInit
NS_UTF16ToCString
NS_Alloc
NS_Free
NS_GetServiceManager
NS_StringContainerInit
NS_StringContainerFinish
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GetModuleHandleA
GetModuleFileNameW
InterlockedDecrement
FreeLibrary
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetCurrentThreadId
SetErrorMode
lstrcmpA
GetCurrentProcessId
CompareStringA
GetModuleHandleW
InterlockedIncrement
GetVersionExA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetFileType
GetSystemTimeAsFileTime
GetCommandLineA
RtlUnwind
RaiseException
VirtualAlloc
HeapSize
Sleep
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
SetHandleCount
GetStartupInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
GlobalGetAtomNameA
GetProcAddress
CreateFileA
GetModuleFileNameA
GetCurrentProcess
CloseHandle
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
MultiByteToWideChar
lstrlenA
SetLastError
GetLastError
GetComputerNameA
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceA
GetSystemTime
LocalFree
OutputDebugStringA
GetTimeZoneInformation
FormatMessageA
user32
SetWindowTextA
ClientToScreen
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
DestroyMenu
PostQuitMessage
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClassNameA
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
GetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
LoadIconA
WinHelpA
GetCapture
SetPropA
GetPropA
RemovePropA
IsWindow
GetClientRect
GetClassLongA
FindWindowExA
EnumWindows
SendMessageTimeoutA
RegisterWindowMessageA
EnableWindow
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
shlwapi
PathFindExtensionA
PathFindFileNameA
SHGetValueA
oleacc
CreateStdAccessibleObject
LresultFromObject
nspr4
PR_AtomicDecrement
PR_AtomicIncrement
gdi32
DeleteDC
GetClipBox
SetTextColor
DeleteObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SaveDC
RestoreDC
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
CreateBitmap
SetBkColor
GetDeviceCaps
SetMapMode
GetStockObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SelectObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
NSGetModule
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ