admparse.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2dc959ae01302ed034f8b2000a6429e3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2dc959ae01302ed034f8b2000a6429e3_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2dc959ae01302ed034f8b2000a6429e3_JaffaCakes118
-
Size
61KB
-
MD5
2dc959ae01302ed034f8b2000a6429e3
-
SHA1
56da7a2dd1b41ce22cb8c4eb9814edba168e6486
-
SHA256
7ac7d44eb851a089d1714c4ad67e2da5f6a8307c55bdb6b1f099716b1a1165e4
-
SHA512
bcc3fdf7a80c07545c6f2a77dfbc0af309def007b1c280ce88bc6f9a1add80ddb63367852ce6372ff85f0e209080994efa808f2ebed1fd0dcdf313c4b4ee881b
-
SSDEEP
1536:Bbtu2nTL+4XtcFhDpeFiZ6uxWjJ6ka6zoLL1+XVltO:Bbtu2TL+KtcFh6IWjk6zoLL18VlM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2dc959ae01302ed034f8b2000a6429e3_JaffaCakes118
Files
-
2dc959ae01302ed034f8b2000a6429e3_JaffaCakes118.dll windows:5 windows x86 arch:x86
f3ac3066b9731a5fe8b7560b232a1a7e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
?terminate@@YAXXZ
_CxxThrowException
_vsnwprintf
??1type_info@@UAE@XZ
_adjust_fdiv
_except_handler3
??3@YAXPAX@Z
??2@YAPAXI@Z
free
malloc
_initterm
kernel32
LeaveCriticalSection
EnterCriticalSection
GlobalAlloc
AddAtomA
WriteFile
SetFilePointer
lstrlenA
lstrcpyW
lstrcmpiW
CompareStringW
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
SetLastError
UnhandledExceptionFilter
GlobalFree
GetFileSize
GetLastError
LocalAlloc
CloseHandle
HeapAlloc
HeapReAlloc
lstrlenW
LocalFree
GetProcessHeap
HeapFree
ReadFile
InitializeCriticalSection
FindAtomA
DeleteAtom
SetUnhandledExceptionFilter
DeleteCriticalSection
WritePrivateProfileSectionW
WritePrivateProfileSectionA
GetPrivateProfileSectionW
GetPrivateProfileSectionA
GetPrivateProfileStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
user32
UnregisterClassA
ShowWindow
SetScrollRange
GetClientRect
SetScrollPos
CreateWindowExA
RegisterClassA
DestroyWindow
GetWindowRect
GetParent
MoveWindow
ReleaseDC
GetDC
EndDialog
EnableWindow
GetDlgItem
SetWindowPos
GetScrollInfo
gdi32
DeleteObject
GetDeviceCaps
GetStockObject
SelectObject
shlwapi
ord340
ord74
ord37
ord59
ord55
ord61
ord91
ord138
ord143
ord93
ord53
ord136
ord95
StrCatW
ord102
ord94
ord56
ord141
ord107
StrRChrW
wnsprintfW
ord298
ord52
StrToIntW
StrDupW
StrCmpNW
StrCpyW
StrCmpW
StrCmpIW
StrSpnW
StrCSpnW
StrCpyNW
ord75
ord217
ord215
ord68
ord295
PathFindFileNameW
ord312
ord437
oleaut32
SysFreeString
VariantInit
SysStringLen
VariantClear
SysAllocString
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
comctl32
ord16
Exports
Exports
AdmClose
AdmFinishedA
AdmFinishedW
AdmInitA
AdmInitW
AdmResetA
AdmResetW
AdmSaveData
CheckDuplicateKeysA
CheckDuplicateKeysW
CreateAdmUiA
CreateAdmUiW
DllMain
GetAdmCategoriesA
GetAdmCategoriesW
GetFontInfoA
GetFontInfoW
IsAdmDirty
ResetAdmDirtyFlag
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ