c:\Documents and Settings\Windows XP\Desktop\Intuneric.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fe096f306f22da4145424fa903585b9f_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
fe096f306f22da4145424fa903585b9f_JaffaCakes118
-
Size
1.3MB
-
MD5
fe096f306f22da4145424fa903585b9f
-
SHA1
dc3193c3fdb332121e6c11407381db34e946ccfe
-
SHA256
c66b2aaa9fff0906e2cdcfbeda4c0b1f848c117e6c4579c0918bb4a6cf18080e
-
SHA512
31a70e0be53328314e5e3c9d2f6677205a9f47939910cd89a6a95f81abedcd257d318a8b4fb57433153a2877a84075fdd4546bc1a790567588f1deaf7c8c0635
-
SSDEEP
24576:mFOoCvSZSNnCantpaOahlOr9QzHDM9ukxvIDyyG5Rdo/1Xt6pBRuGX+ftAAb:zmaujlS6HQRZIWyG574Nkp21
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe096f306f22da4145424fa903585b9f_JaffaCakes118
Files
-
fe096f306f22da4145424fa903585b9f_JaffaCakes118.dll windows:5 windows x86 arch:x86
a2635965fc107b9ad4634ee47456bb46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
DisableThreadLibraryCalls
GetModuleFileNameA
CreateThread
GetTimeFormatA
VirtualAlloc
ReadProcessMemory
GetModuleHandleA
IsBadReadPtr
IsBadWritePtr
VirtualProtect
Sleep
GetCurrentProcess
Beep
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapFree
GetProcessHeap
HeapAlloc
InterlockedCompareExchange
InterlockedExchange
OutputDebugStringA
VirtualFree
GetProcAddress
LoadLibraryA
WideCharToMultiByte
MultiByteToWideChar
IsProcessorFeaturePresent
GetSystemInfo
GetVersionExA
ExitProcess
user32
MessageBoxA
GetAsyncKeyState
MessageBeep
DefWindowProcA
DestroyWindow
CreateWindowExA
GetDesktopWindow
RegisterClassExA
GetSystemMetrics
SetRect
GetCursorPos
msvcp90
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?length@?$char_traits@D@std@@SAIPBD@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHPBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?uncaught_exception@std@@YA_NXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?_Unlock@_Mutex@std@@QAEXXZ
?_Lock@_Mutex@std@@QAEXXZ
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
winmm
sndPlaySoundA
d3d9
Direct3DCreate9
msvcr90
fread
fseek
fwrite
fclose
tmpfile
_except_handler4_common
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_crt_debugger_hook
sscanf
isspace
isdigit
_setjmp3
longjmp
modf
iswspace
iswalpha
iswdigit
iswpunct
__CxxFrameHandler
strncpy
_CIpow
??3@YAXPAX@Z
_ftol
_finite
_CIacos
system
__CxxFrameHandler3
vsprintf
clock
sprintf
memmove
??2@YAPAXI@Z
memset
malloc
sqrt
strstr
exit
floor
setlocale
_strdup
free
ldexp
__clean_type_info_names_internal
gdi32
CreateDIBSection
DeleteDC
DeleteObject
SelectObject
GetCharacterPlacementA
GetGlyphOutlineA
SetTextColor
SetBkColor
SetBkMode
GetTextMetricsW
GetFontLanguageInfo
CreateFontIndirectA
GetTextMetricsA
GetObjectW
GetCharacterPlacementW
ExtTextOutW
MoveToEx
ExtTextOutA
CreateCompatibleDC
SetMapMode
SetTextAlign
CreateFontIndirectW
GetObjectA
advapi32
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: 292KB - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 894KB - Virtual size: 906KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE