g:\src\albion\trunk\Ad-Protect\Ad-Protect\Src\IEControl\Release\IEControl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14247a1cc276d400dce3ea1ea179d97a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14247a1cc276d400dce3ea1ea179d97a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
14247a1cc276d400dce3ea1ea179d97a_JaffaCakes118
-
Size
68KB
-
MD5
14247a1cc276d400dce3ea1ea179d97a
-
SHA1
28732859d0f5ae0fc322c65022c152933c34563d
-
SHA256
a0e9ca423a58f79da88192ae99c14e0182286c07e70e2c1cc9bfc7468d6ccd3b
-
SHA512
c3c75b4ae931d4503a2a1e32aecae88d0b76066d2edc0ef02d830b602d13d62a20b26e67a69d5288fa409c761da91a4dfc866b1d619684c7c1761a95986ddf05
-
SSDEEP
768:b1+ZQ0K5f8aaLevyfnWXwmrqBoGI9nLJxgrSwZqphcMm7X+a+oIgWjxqAzu6Bp:bLAev+nWgfZkLESwZqph0NWjxqAzu4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14247a1cc276d400dce3ea1ea179d97a_JaffaCakes118
Files
-
14247a1cc276d400dce3ea1ea179d97a_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
498beca832187f414a2df6f155c92316
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenA
lstrcmpiA
GetModuleFileNameA
lstrcpynA
lstrcpyA
lstrcatA
IsDBCSLeadByte
InterlockedIncrement
InterlockedDecrement
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
RaiseException
LockResource
FindResourceExA
lstrcmpiW
VirtualProtect
QueryPerformanceCounter
LocalFree
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetModuleHandleA
InterlockedExchange
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
ExitProcess
user32
CharNextA
advapi32
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
ole32
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
oleaut32
VariantClear
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysStringLen
rpcrt4
NdrStubForwardingFunction
NdrOleFree
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrDllGetClassObject
NdrDllCanUnloadNow
NdrCStdStubBuffer2_Release
NdrDllUnregisterProxy
NdrDllRegisterProxy
msvcr71
__CppXcptFilter
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
memmove
_mbscmp
fclose
??2@YAPAXI@Z
??_U@YAPAXI@Z
realloc
wcsncpy
??_V@YAXPAX@Z
__CxxFrameHandler
??3@YAXPAX@Z
_CxxThrowException
_except_handler3
_resetstkoflw
free
malloc
_mbslwr
_mbsstr
memset
shlwapi
PathFindExtensionA
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 4KB - Virtual size: 46B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ