wpdmtp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
55be385cdf00725d66ba3961a827d4bf_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55be385cdf00725d66ba3961a827d4bf_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
55be385cdf00725d66ba3961a827d4bf_JaffaCakes118
-
Size
167KB
-
MD5
55be385cdf00725d66ba3961a827d4bf
-
SHA1
5511485e83a23b27a637c16d1fae1f0153545d2b
-
SHA256
577108615ca9a6d81f2da6639aa966db72029d8eda8ad69509efe6ca93922932
-
SHA512
734503160c1b8f2c29319142c170a97cea05fa2b1b02635ad1040a2f427ef36f8feb78100d6442cf979c2074f996bf76cec368b77c9e3941449c3cd7d785e72b
-
SSDEEP
3072:VQ+0RlnpswbBBagTdRj547VIfZLXnsLnbk+r22I:SpswtBacJMIfZDQnb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55be385cdf00725d66ba3961a827d4bf_JaffaCakes118
Files
-
55be385cdf00725d66ba3961a827d4bf_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
7a7fc9cebf934fa70860a32f29cd2478
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
DisableThreadLibraryCalls
lstrcpynW
lstrcatW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
CreateThread
CloseHandle
WaitForSingleObject
HeapFree
GetProcessHeap
HeapAlloc
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
lstrcmpiW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
FormatMessageA
InterlockedCompareExchange
GetLocalTime
ExpandEnvironmentStringsW
CreateDirectoryW
CreateMutexW
CreateFileW
ReleaseMutex
LocalFree
GetSystemDirectoryA
lstrcatA
LoadLibraryA
LoadLibraryW
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
lstrcmpA
lstrlenA
WideCharToMultiByte
GetVersionExA
Sleep
GetLastError
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
InterlockedExchange
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
GetCurrentProcess
msvcrt
_onexit
__dllonexit
_adjust_fdiv
_initterm
wcscmp
wcsstr
wcstod
wcsrchr
wcslen
_wcsnicmp
realloc
wcsncpy
_purecall
??2@YAPAXI@Z
malloc
??3@YAXPAX@Z
free
_except_handler3
strncat
strncpy
_splitpath
_vsnprintf
_vsnwprintf
_snprintf
ntdll
memset
advapi32
RegCreateKeyExW
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExW
RegQueryValueExA
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorW
user32
CharNextA
CharUpperA
CharNextW
oleaut32
SysStringLen
VariantClear
VariantCopy
VariantInit
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SafeArrayCreateVector
SafeArrayGetElemsize
SysAllocStringLen
shlwapi
PathFindExtensionW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
StringFromGUID2
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ