C:\BUILD_~1\jdk6_29\control\build\WINDOW~1\tmp\deploy\plugin\adapter\ns7\obj\jpioji.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2bec43973b5d63a7174d9566007f8744_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2bec43973b5d63a7174d9566007f8744_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2bec43973b5d63a7174d9566007f8744_JaffaCakes118
-
Size
128KB
-
MD5
2bec43973b5d63a7174d9566007f8744
-
SHA1
1b216f839ccd1883453c9916c607263bc9411bcf
-
SHA256
d2bfdda1cf29d76e3d9dc356f51cd25b30d4a2d6981c23a3d609fe6e30fb2756
-
SHA512
abe220d6bee74463bfc484605f48bfd4a1eae0affc75aa3dc86d12c048f306dc1c31220ee74cf6c5f5284d4166155171163fe4f345f25a326ab593aba850fbf1
-
SSDEEP
3072:E9Q2nxME5B110K2PiOaGyE4VCxvBUfeRWHdnpTBluQucs:E9Q2xMw90jV4Vddjlud
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bec43973b5d63a7174d9566007f8744_JaffaCakes118
Files
-
2bec43973b5d63a7174d9566007f8744_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
308ce4e30d9f1c9c9ba88438696d1e71
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
kernel32
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetLastError
InterlockedIncrement
lstrcpyA
lstrlenA
GetModuleFileNameA
lstrcatA
DisableThreadLibraryCalls
InterlockedDecrement
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
HeapFree
GetProcessHeap
InterlockedCompareExchange
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
GetSystemTimeAsFileTime
user32
CharNextA
ole32
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
SysAllocString
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysFreeString
shlwapi
PathFindExtensionA
msvcr71
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
memset
realloc
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
malloc
_resetstkoflw
_CxxThrowException
wcsncpy
??_U@YAPAXI@Z
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE