c:\savxp\build\symbols\Release\SAVPosturePlugin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e203e762ea2d329656c1460a370e4606_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e203e762ea2d329656c1460a370e4606_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e203e762ea2d329656c1460a370e4606_JaffaCakes118
-
Size
110KB
-
MD5
e203e762ea2d329656c1460a370e4606
-
SHA1
8611e5074c4fa47df1364b3ad7f049cc26ba5e77
-
SHA256
588051c394cb4f18db6b1746afd41da67719825f1e9d8379495f35538781a982
-
SHA512
f9d436b7abeef3ae533555c4a05b0caddd2332db1c769b42f053e5f53b506f5c9f06dbdf6a8d4fe7a31e54ec0677a6b347ec1a6df0adf2f639422239cd868b93
-
SSDEEP
1536:touLgJmFdleyEbbNqnokbiU5nFYn52pk2EoGjQQ+asI:auLgJKfT7pk2E7jQQ+asI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e203e762ea2d329656c1460a370e4606_JaffaCakes118
Files
-
e203e762ea2d329656c1460a370e4606_JaffaCakes118.dll windows:4 windows x86 arch:x86
98327b3743bb71bfc7fcb15cc3eed9ee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateFileA
LeaveCriticalSection
SetLastError
EnterCriticalSection
DeviceIoControl
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
OpenEventW
LoadResource
SetFilePointer
CloseHandle
SizeofResource
WriteFile
FindResourceW
WaitForSingleObject
GetComputerNameExW
FindResourceExW
RaiseException
HeapFree
GetProcessHeap
GetThreadLocale
SetEnvironmentVariableA
GetLastError
InitializeCriticalSection
GetVersionExA
LockResource
DeleteCriticalSection
CompareStringW
CompareStringA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InterlockedExchange
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetLocaleInfoA
LoadLibraryA
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetTimeZoneInformation
ExitProcess
Sleep
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
user32
UnregisterClassA
advapi32
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
shell32
SHGetFolderPathW
SHCreateDirectoryExW
ole32
CoQueryProxyBlanket
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
CoInitializeEx
OleRun
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
shlwapi
PathAppendW
SHGetValueW
SHSetValueW
ws2_32
htons
ntohl
htonl
ntohs
Exports
Exports
processPostureNotification
processPostureRequest
queryPostureStatusChange
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ