acppage.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4184405de3f9706573610895dd9c4558_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4184405de3f9706573610895dd9c4558_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
4184405de3f9706573610895dd9c4558_JaffaCakes118
-
Size
38KB
-
MD5
4184405de3f9706573610895dd9c4558
-
SHA1
5a499806bae8ad634eaa8a63412d5cf7d99b1e1d
-
SHA256
a8d1cc2f93d020ef81bbe317048445595eaeaf4e257e8871317926f3df8f590b
-
SHA512
6065bc95543715c0831ed5b0d6eed9d1cbbd47330d8ec4c8c3512a0a9eab2aa47d8ed8b620f19e6a7f95ed3bf73576a842a9d569d420d7be740a1a0fd5f3443c
-
SSDEEP
768:uTERvKYRgrpRqt6LuSBQ6qRD549AFlgsQAygevZml:FKsgFRqtAuS66q/49AwsQAygevZml
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4184405de3f9706573610895dd9c4558_JaffaCakes118
Files
-
4184405de3f9706573610895dd9c4558_JaffaCakes118.dll regsvr32 windows:6 windows x86 arch:x86
9dc396059509745dce5e957b04ff53af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_wcsicmp
memset
??_U@YAPAXI@Z
??2@YAPAXI@Z
malloc
??3@YAXPAX@Z
_XcptFilter
_initterm
_amsg_exit
_adjust_fdiv
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_wcsupr
wcsstr
_vsnwprintf
??_V@YAXPAX@Z
wcscat_s
wcsncpy_s
wcscpy_s
free
kernel32
CreateDirectoryW
GetModuleHandleW
CreateActCtxW
ReleaseActCtx
ActivateActCtx
FreeLibrary
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeactivateActCtx
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
GetModuleFileNameW
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
SetThreadLocale
GetThreadLocale
HeapAlloc
GetProcessHeap
DecodePointer
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
LocalFree
EncodePointer
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
HeapFree
CheckElevationEnabled
GetBinaryTypeW
GetVersionExA
InterlockedExchange
user32
GetDlgItem
EnableWindow
SetWindowLongW
GetSystemMetrics
GetParent
GetWindowLongW
SendMessageW
LoadStringW
SendDlgItemMessageW
UnregisterClassA
CharNextW
shlwapi
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
advapi32
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegCloseKey
shell32
ord155
SHParseDisplayName
DragQueryFileW
SHGetNameFromIDList
SHChangeNotify
ole32
HWND_UserFree
HWND_UserUnmarshal
ReleaseStgMedium
CoTaskMemFree
CoGetObject
CoCreateInstance
StringFromGUID2
CoCreateGuid
HWND_UserSize
HWND_UserMarshal
rpcrt4
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrOleFree
NdrStubForwardingFunction
NdrStubCall2
NdrOleAllocate
NdrDllRegisterProxy
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrDllUnregisterProxy
oleaut32
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
SysFreeString
sfc
SfcIsFileProtected
ntdll
NtOpenThreadToken
NtOpenProcessToken
NtClose
NtQueryInformationToken
RtlStringFromGUID
RtlFreeUnicodeString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
wer
WerReportAddFile
WerReportCloseHandle
WerReportSubmit
WerReportSetParameter
WerReportCreate
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 512B - Virtual size: 51B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ