d:\LocalSvnForDailyBuild\dabingusa_beta\Bin\Release\ToLoadAdapter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
39756536ce45432df5d386962c348d6b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39756536ce45432df5d386962c348d6b_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
39756536ce45432df5d386962c348d6b_JaffaCakes118
-
Size
276KB
-
MD5
39756536ce45432df5d386962c348d6b
-
SHA1
ed5e18af6bd3d63a7a47f9cb6b6fb028c0597b0a
-
SHA256
7f70253d3fe3d3b7ea9053a79335e9664fe2cfd13f393dc6b4e7b07a39911155
-
SHA512
5feb61f70f9652382d070c7a5be6d7f24a3759e35aa4bbddd84fd0a3d36c348de26fbcdd3810f13516c5512c8ae47e422d2f550f26efb3fa32902aa8a0a4ec89
-
SSDEEP
3072:d4S6lHdvcUNGAYjpc1V9tnnRjfX4jQ94tPxbVnJesWeTXRofrasnGn0thwLXTB4V:6ndvcUNjYO9hBQQ94txbVaeEcswLjA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39756536ce45432df5d386962c348d6b_JaffaCakes118
Files
-
39756536ce45432df5d386962c348d6b_JaffaCakes118.dll windows:4 windows x86 arch:x86
5779764215a56c4d46e2f0763020beef
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
imagehlp
CheckSumMappedFile
psapi
GetModuleInformation
GetProcessImageFileNameA
kernel32
GetThreadLocale
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
VirtualAlloc
GetCommandLineA
ExitProcess
GetOEMCP
RaiseException
WriteConsoleW
GetFileType
GetStdHandle
HeapSize
Sleep
GetACP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
LoadLibraryW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetCPInfo
InterlockedIncrement
GlobalFlags
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
FindResourceA
LoadResource
LockResource
SizeofResource
Process32First
Process32Next
CreateMutexA
CreateSemaphoreA
ReleaseSemaphore
GetCurrentProcessId
LocalAlloc
IsBadReadPtr
CreateToolhelp32Snapshot
Thread32First
OpenThread
SuspendThread
Thread32Next
GetVersionExA
OpenProcess
WaitForSingleObject
TerminateProcess
GetCurrentProcess
VirtualProtect
WritePrivateProfileStringA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetFileSize
GetModuleFileNameA
GetTickCount
HeapFree
GetProcessHeap
HeapAlloc
ResumeThread
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
VirtualProtectEx
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
InterlockedExchange
GetVersion
lstrlenA
CompareStringA
WideCharToMultiByte
GetLastError
GetCurrentThreadId
RtlUnwind
user32
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ClientToScreen
ShowWindow
SetWindowTextA
UnregisterClassA
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
IsWindowEnabled
GetMenuState
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
ReleaseDC
RemovePropA
GetFocus
IsWindow
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
EnableWindow
SetForegroundWindow
IsWindowVisible
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
GetSysColorBrush
LoadCursorA
GetPropA
SendMessageA
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
EnumWindows
GetWindowThreadProcessId
PostMessageA
MessageBoxA
GetClassNameA
GetDlgItem
GetKeyState
gdi32
DeleteDC
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetBkColor
SetTextColor
GetClipBox
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
DeleteObject
CreateBitmap
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
SetSecurityInfo
FreeSid
shell32
SHFileOperationA
shlwapi
PathFindExtensionA
PathFindFileNameA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 180KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ