obepopc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2b4e6c8a7dfa319cf1f5ae39e7544e22_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b4e6c8a7dfa319cf1f5ae39e7544e22_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2b4e6c8a7dfa319cf1f5ae39e7544e22_JaffaCakes118
-
Size
84KB
-
MD5
2b4e6c8a7dfa319cf1f5ae39e7544e22
-
SHA1
6cb3566290688027e5410d4c3eeacb02b70da3bc
-
SHA256
627a829670eed1d2d08a035d4d3647720e0531302f6649d9754524b86b180396
-
SHA512
4c4d245b25ab5485e680e33c03d1f0567389ebcb0601b52870af516f3c4201c14b9f6014b9e0bf22023f7217102ec4e51ac77df116eabb79354f15f604040c67
-
SSDEEP
1536:FXAYBNYMjOIzhdGnFNCcW5DvbNI61aXkDH:FXzNVFdGnFNCf5bbZd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b4e6c8a7dfa319cf1f5ae39e7544e22_JaffaCakes118
Files
-
2b4e6c8a7dfa319cf1f5ae39e7544e22_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
29e0c6d9f001b00e63f33f75955a3e03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
EnterCriticalSection
DisableThreadLibraryCalls
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
lstrcmpiA
lstrcpyA
IsBadWritePtr
IsBadReadPtr
GetLastError
GetShortPathNameA
lstrlenW
MultiByteToWideChar
lstrcatA
IsDBCSLeadByte
LeaveCriticalSection
HeapDestroy
SizeofResource
WideCharToMultiByte
SetUnhandledExceptionFilter
DebugBreak
GetVersionExA
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LoadResource
FreeLibrary
lstrcpynA
lstrlenA
DeleteCriticalSection
FindResourceA
FormatMessageA
HeapAlloc
HeapFree
GetProcessHeap
CloseHandle
GetVersion
LocalFree
LocalAlloc
LocalReAlloc
RaiseException
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
ExitProcess
TerminateProcess
GetCurrentProcess
RtlUnwind
GetLocalTime
GetDateFormatA
CreateEventA
CreateThread
SetEvent
WaitForSingleObject
OutputDebugStringA
IsBadCodePtr
user32
CharUpperA
wsprintfA
CharNextA
advapi32
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegDeleteValueA
RegSetValueExA
RegEnumValueA
oleaut32
SysStringLen
SysFreeString
LoadTypeLi
SysAllocStringLen
VarUI4FromStr
RegisterTypeLi
SysAllocString
ole32
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateGuid
wininet
InternetSetOptionA
HttpSendRequestA
HttpAddRequestHeadersA
InternetCloseHandle
HttpQueryInfoA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetReadFile
shlwapi
StrCmpW
wnsprintfW
wnsprintfA
StrCmpIW
rpcrt4
UuidToStringA
RpcStringFreeA
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE