d:\src\Hp\InstallMetrics\InstallMetrics\Release\InstallMetrics.pdb
Static task
static1
Behavioral task
behavioral1
Sample
10fd4ae517b681348e10fd81f709fbc2_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
10fd4ae517b681348e10fd81f709fbc2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
10fd4ae517b681348e10fd81f709fbc2_JaffaCakes118
-
Size
228KB
-
MD5
10fd4ae517b681348e10fd81f709fbc2
-
SHA1
6c07d45ca333e8fd94a707785a71ef0f0fc14dee
-
SHA256
b61db2602e8b12512e7f96ba3bc748d0e96fc1b254272934efa26df79bb24c3f
-
SHA512
33c0de72acff10f66e2aa8ded47fcc02d3b3b13ad4bb93e24aa8e18935817bfbc2e086bba3f85ff9a7c936050c8943454fd0844dcae859fc42053ccef1d080b5
-
SSDEEP
3072:+aCROaZ0dJ5mqoYnSnrWfXZQSPj3eiErlnAfH/sN+dBlD0JL31g+UY5G:+apkq4eZpjnkA1dBRUphrk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10fd4ae517b681348e10fd81f709fbc2_JaffaCakes118
Files
-
10fd4ae517b681348e10fd81f709fbc2_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
4698a13324b4e4590a69a0303cea6eb8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetLastError
InitializeCriticalSection
DeleteCriticalSection
LocalFree
lstrlenA
lstrcmpiA
InterlockedDecrement
lstrcpynA
LeaveCriticalSection
EnterCriticalSection
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
RaiseException
lstrcpyA
lstrcatA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
CloseHandle
FlushFileBuffers
InterlockedIncrement
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetModuleFileNameA
InterlockedExchange
SetStdHandle
SetFilePointer
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetProcAddress
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
GetCommandLineA
GetCurrentThreadId
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
ExitProcess
GetStringTypeW
GetStringTypeA
GetProcessHeap
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsBadWritePtr
VirtualFree
HeapCreate
LCMapStringW
LCMapStringA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
user32
CharNextA
advapi32
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
ole32
CoTaskMemRealloc
StringFromGUID2
CoTaskMemAlloc
OleRun
CoCreateInstance
CoTaskMemFree
oleaut32
RegisterTypeLi
UnRegisterTypeLi
BSTR_UserSize
BSTR_UserMarshal
BSTR_UserUnmarshal
BSTR_UserFree
LoadTypeLi
LoadRegTypeLi
SysAllocStringLen
VarUI4FromStr
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
GetErrorInfo
VariantInit
shlwapi
PathFindExtensionA
wininet
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
InternetConnectA
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetOptionA
rpcrt4
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
NdrStubForwardingFunction
NdrStubCall2
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 4KB - Virtual size: 46B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ