DirectDB.pdb
Static task
static1
Behavioral task
behavioral1
Sample
093b7e09bef047d54064fc0af02248be_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
093b7e09bef047d54064fc0af02248be_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
093b7e09bef047d54064fc0af02248be_JaffaCakes118
-
Size
90KB
-
MD5
093b7e09bef047d54064fc0af02248be
-
SHA1
1781f08aef199c7d0f592fcef486bc6724872b80
-
SHA256
69a5986799507b232588c5dda519ba2ccb9ee01ec7a45db82745365ae327b0ad
-
SHA512
580d65a2391246715ed52893e58d83d07a9ab2cf6b9de11a9117f8b69b97f9bcf94045c733f5e66e41ea72f3ff2d94fc0c021a9c5c4684f72fe8d4837a90c9eb
-
SSDEEP
1536:DBOGZGx4N+99VEseIWlFbecc1a+DMAXUeWsPpMO5xob/8qGi1b/M0tu8wPyKC74:9OGZGx4N+MIcFbeC8qP1bEbPyKC74
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 093b7e09bef047d54064fc0af02248be_JaffaCakes118
Files
-
093b7e09bef047d54064fc0af02248be_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
0978a9b968bad9db283d2887c2c8af3d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegCloseKey
shlwapi
PathRemoveFileSpecA
StrCmpW
PathRenameExtensionW
PathFileExistsW
StrToIntExA
StrStrIA
StrStrA
StrCpyNW
StrCmpIW
ord80
PathFindFileNameW
ord158
ord125
SHRegGetValueW
kernel32
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
VirtualProtect
DeleteCriticalSection
DisableThreadLibraryCalls
GetSystemInfo
InitializeCriticalSection
GetVersionExA
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
GetStringTypeExA
IsDBCSLeadByte
lstrcmpA
CloseHandle
WaitForSingleObject
SetEvent
CreateThread
CreateEventA
lstrlenA
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
SetLastError
GetLastError
GetFullPathNameA
GetFullPathNameW
CreateMutexA
CreateMutexW
CreateFileA
CreateFileW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
OpenFileMappingA
OpenFileMappingW
CreateFileMappingA
CreateFileMappingW
MoveFileA
MoveFileW
DeleteFileA
DeleteFileW
LocalFree
LocalAlloc
UnmapViewOfFile
FlushViewOfFile
ReleaseMutex
GetTickCount
IsBadReadPtr
HeapAlloc
HeapFree
GetCurrentThreadId
RtlMoveMemory
Sleep
GetCurrentProcessId
SetFileTime
GetSystemTimeAsFileTime
HeapDestroy
SetEndOfFile
SetFilePointer
HeapCreate
FreeLibrary
GetProcAddress
LoadLibraryA
MapViewOfFile
GetFileSize
CompareFileTime
GetEnvironmentVariableA
lstrcpynA
GetModuleFileNameA
TlsSetValue
GetCommandLineA
ExitProcess
GetModuleHandleA
TlsFree
TlsGetValue
TlsAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
VirtualFree
WriteFile
RtlUnwind
InterlockedExchange
VirtualQuery
UnhandledExceptionFilter
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
ole32
CoGetMalloc
CoCreateInstance
user32
TranslateMessage
GetMessageA
SetTimer
CharLowerBuffA
DispatchMessageA
PostMessageA
PeekMessageA
SendMessageTimeoutA
IsWindow
GetDesktopWindow
RegisterClassA
GetClassInfoA
CreateWindowExA
KillTimer
DestroyWindow
GetWindowLongA
SetWindowLongA
DefWindowProcA
PostThreadMessageA
UnregisterClassA
CharUpperA
CharLowerBuffW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ