C:\BUILD_AREA\jdk6\control\build\windows-i586\tmp\sun\sun.awt\jawt\obj\jawt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cf469021e416c5ffefee6a2afc4257ce_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf469021e416c5ffefee6a2afc4257ce_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cf469021e416c5ffefee6a2afc4257ce_JaffaCakes118
-
Size
111KB
-
MD5
cf469021e416c5ffefee6a2afc4257ce
-
SHA1
8e006340d330387b5ee182b3ada1545c3f43cc2b
-
SHA256
e807b1b007d998089bdf35b2f90e37c89bf7619ae4b7b3f4ddacacb3559c4256
-
SHA512
6f613ebe8587a78cc5439ac282ad6f98d811c8a375702b6c424a947e0590d584f6a5c898bf6a059ee104fbcf956544a6d4ea6aacf0f8e3f28873b5db90a53f84
-
SSDEEP
3072:g7iK3BpeIFciV3jU4nEvlTaPxpg0Vi8KGLYoLO:gWIKIFc0N4kEc1nC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf469021e416c5ffefee6a2afc4257ce_JaffaCakes118
Files
-
cf469021e416c5ffefee6a2afc4257ce_JaffaCakes118.dll windows:4 windows x86 arch:x86
b4df9e2eaab709a162b6f70da1d5a031
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
awt
_DSGetDrawingSurface@8
_DSFreeDrawingSurface@4
_DSLockAWT@4
_DSUnlockAWT@4
_DSGetComponent@8
msvcr71
_onexit
__dllonexit
_except_handler3
free
_initterm
malloc
_adjust_fdiv
__CppXcptFilter
kernel32
DisableThreadLibraryCalls
Exports
Exports
_JAWT_GetAWT@8
Sections
.text Size: 1024B - Virtual size: 852B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 906B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 166B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 106KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE