wiascr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e1245a33d537a12d0f25a0755da45a6a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1245a33d537a12d0f25a0755da45a6a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e1245a33d537a12d0f25a0755da45a6a_JaffaCakes118
-
Size
213KB
-
MD5
e1245a33d537a12d0f25a0755da45a6a
-
SHA1
1849581cbcee95a2a1996e08e3340d7fd9eb182d
-
SHA256
4c0a482173eb35b845a260b4d141380f4b8ee3db6e0d9b2d27cbe9305ffa4472
-
SHA512
e3256f031729803cdb18aa24f6fc343f22c8795d019f758cfb23ef1e3a928df6b020404987d9f1aa89fa6eb3c792832c6a0eb808fff922ce2d8982479998af22
-
SSDEEP
3072:KmPBOEeyz1PkZ+kJwDhfMzdsBjS0/IV9/aw2D5mp3tr62Rbsee8jteUpSk1:KKBzj1cZIksBjYanadG22fEi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1245a33d537a12d0f25a0755da45a6a_JaffaCakes118
Files
-
e1245a33d537a12d0f25a0755da45a6a_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
6a04055e6b922eb67e3f78eefeba06da
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
free
_purecall
realloc
malloc
_except_handler3
wcscmp
wcscat
swprintf
sprintf
_strcmpi
_wcsicmp
_initterm
_adjust_fdiv
??3@YAXPAX@Z
??2@YAPAXI@Z
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
advapi32
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
kernel32
QueryPerformanceCounter
GetShortPathNameW
LoadLibraryExW
GetLastError
FindResourceW
GetTickCount
SizeofResource
DisableThreadLibraryCalls
LoadLibraryW
GetProcAddress
FreeLibrary
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LoadResource
lstrlenA
InterlockedIncrement
VirtualAlloc
VirtualProtect
EnterCriticalSection
lstrlenW
HeapCreate
GetSystemInfo
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapFree
DeleteCriticalSection
HeapDestroy
WideCharToMultiByte
LocalFree
LocalAlloc
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateThread
CloseHandle
lstrcpyW
InitializeCriticalSection
lstrcmpiW
lstrcpynW
lstrcatW
GetModuleFileNameW
user32
DestroyWindow
DefWindowProcW
SetPropW
RemovePropW
GetPropW
CreateWindowExW
RegisterClassExW
GetClassInfoExW
RegisterWindowMessageW
wsprintfW
PostMessageW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
CharNextW
oleaut32
SysAllocString
VariantClear
VariantChangeType
LoadRegTypeLi
SysStringLen
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
VariantInit
SysAllocStringLen
SysFreeString
shlwapi
StrCpyNW
StrChrIW
StrCmpNIW
StrRChrIW
StrCpyW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
PropVariantClear
FreePropVariantArray
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoMarshalInterThreadInterfaceInStream
StringFromGUID2
CoTaskMemRealloc
Exports
Exports
ServiceMain
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ