davclnt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14bf35afeab366eb31ff04cf79dcba61_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14bf35afeab366eb31ff04cf79dcba61_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
14bf35afeab366eb31ff04cf79dcba61_JaffaCakes118
-
Size
85KB
-
MD5
14bf35afeab366eb31ff04cf79dcba61
-
SHA1
61d00c3399f7c535b9497134375753bd52a5448f
-
SHA256
5fd3ddf38d5dead9413b38d3f9c32c035b4158ad655b27751fe459015d474ae9
-
SHA512
103b88c9c19b306d385ae88f54d35520906985bed73d5e5c6ec773d52270729d543e53a20aabab2c5d3519a9149718d20fe3330b3ae421c40f14e150f5d63a43
-
SSDEEP
1536:twiaMo2jwjvKVR/zZD2+fXftCMsWrOtJ5p:KiwjvOR/FHfXljE5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14bf35afeab366eb31ff04cf79dcba61_JaffaCakes118
Files
-
14bf35afeab366eb31ff04cf79dcba61_JaffaCakes118.dll windows:5 windows x86 arch:x86
4b1eaf126458b2c18131ee05364c6acc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_adjust_fdiv
_initterm
free
wcsncpy
wcslen
wcschr
??2@YAPAXI@Z
??3@YAXPAX@Z
wcscmp
_wcsnicmp
iswctype
_wcsicmp
wcscpy
malloc
wcsncmp
wcscat
_except_handler3
advapi32
QueryServiceStatus
GetUserNameW
LookupAccountNameW
EqualSid
OpenSCManagerW
OpenServiceW
CloseServiceHandle
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
kernel32
Sleep
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
QueryDosDeviceW
InterlockedIncrement
GetComputerNameExW
GetComputerNameW
InterlockedDecrement
QueryPerformanceCounter
UnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
LocalAlloc
LocalFree
GetTickCount
ole32
CoTaskMemFree
CoTaskMemAlloc
rpcrt4
I_RpcExceptionFilter
RpcStringBindingComposeW
RpcBindingFree
RpcStringFreeW
RpcBindingFromStringBindingW
NdrClientCall2
netapi32
I_NetPathType
I_NetNameCanonicalize
I_NetPathCanonicalize
secur32
GetUserNameExW
user32
wsprintfW
LoadStringW
ntdll
RtlNtStatusToDosError
Exports
Exports
DavFreeUsedDiskSpace
DavGetDiskSpaceUsage
DavGetTheLockOwnerOfTheFile
DllCanUnloadNow
DllGetClassObject
DllMain
NPAddConnection
NPAddConnection3
NPCancelConnection
NPCloseEnum
NPEnumResource
NPFormatNetworkName
NPGetCaps
NPGetConnection
NPGetResourceInformation
NPGetResourceParent
NPGetUniversalName
NPGetUser
NPOpenEnum
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 61KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ