c:\Temp\autobuilder\wa\ta_productapiloader-sa1tss#rd_2011_34_0_49126\ta_productapiloader\release\ta_productapiloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2dabd29a0512df3250e1ab8c52e8bee1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2dabd29a0512df3250e1ab8c52e8bee1_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2dabd29a0512df3250e1ab8c52e8bee1_JaffaCakes118
-
Size
296KB
-
MD5
2dabd29a0512df3250e1ab8c52e8bee1
-
SHA1
d4a66b204c161b36e39782b45a3d9e684cbd4026
-
SHA256
f8ea542ca5b936641406f082709e9682f271a9840c1723ab89dd14c215e1dfde
-
SHA512
c52e2181485009568145582dfb6d3ea0419d5e84d6750a3cac8020e6b9eb0ffb36ee5d045db0b96a6fea3cab87a6b89d1cb9077c46ece18981ab697d0a3fec7b
-
SSDEEP
6144:W8I3xpEQiFGHDIRQzAnSBWxjnXqpSdwWR:PI3gzFGEnSkVdws
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2dabd29a0512df3250e1ab8c52e8bee1_JaffaCakes118
Files
-
2dabd29a0512df3250e1ab8c52e8bee1_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
aad2622363d3cf31ea3c7268d9b836ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
LoadLibraryW
SetCurrentDirectoryW
GetCurrentDirectoryW
EnterCriticalSection
FindResourceExW
GetModuleFileNameA
FindResourceA
LoadLibraryExA
LocalFree
FormatMessageA
VirtualQuery
GetModuleHandleW
SetThreadLocale
GetThreadLocale
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
lstrlenW
WideCharToMultiByte
LeaveCriticalSection
MultiByteToWideChar
GetStringTypeW
LCMapStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
Sleep
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
GetModuleFileNameW
GetStdHandle
WriteFile
GetProcessHeap
ExitProcess
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
RtlUnwind
EncodePointer
DecodePointer
user32
CharNextW
CharNextA
advapi32
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyExA
RegQueryInfoKeyW
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
shell32
SHGetFolderPathA
ole32
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
StringFromGUID2
oleaut32
VarUI4FromStr
BSTR_UserFree
BSTR_UserUnmarshal
BSTR_UserMarshal
BSTR_UserSize
SysStringLen
SysFreeString
VarBstrCat
SysAllocStringLen
SysAllocString
SysAllocStringByteLen
SysStringByteLen
UnRegisterTypeLi
LoadRegTypeLi
LoadTypeLi
SetErrorInfo
CreateErrorInfo
RegisterTypeLi
rpcrt4
NdrStubCall2
NdrStubForwardingFunction
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrOleFree
NdrOleAllocate
NdrDllGetClassObject
NdrDllCanUnloadNow
NdrCStdStubBuffer2_Release
NdrDllRegisterProxy
NdrDllUnregisterProxy
shlwapi
PathFileExistsA
PathFileExistsW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 51B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ