g:\build\bin\w32\bin\smarttags.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_02b85599192167533d017c63f3e6ef10.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_02b85599192167533d017c63f3e6ef10
-
Size
144KB
-
MD5
02b85599192167533d017c63f3e6ef10
-
SHA1
29d1f81714d0701651abb25cf0de8f822c90abe7
-
SHA256
fdd2a9cade15b9658cc93cd975b6e646b03ec251e6514c44256afd22fbce281d
-
SHA512
20d1dab37ec4a61950f0a32d80c413014598a59f6eeeb710fdc1a341a5aadc94ebad695c59f3f30046afb1af762dd4e43131c3b74703558e56d6e1f07be3e2cb
-
SSDEEP
3072:MROQhL+xq/S++qUAaeli5Rl5s9ctkp54IXH6SwBDJ:2h4ycAax5dectkIJSk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_02b85599192167533d017c63f3e6ef10
Files
-
JaffaCakes118_02b85599192167533d017c63f3e6ef10.dll regsvr32 windows:4 windows x86 arch:x86
888cfba6e0cfe409d91cebc59a9efb16
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
lstrcpyA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
EnterCriticalSection
LeaveCriticalSection
lstrlenA
lstrcmpiA
InterlockedIncrement
InterlockedDecrement
lstrcpynA
GetModuleFileNameA
lstrcatA
CreateThread
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
UnmapViewOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
CreateFileMappingA
GetLastError
MapViewOfFile
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetModuleHandleA
InterlockedExchange
LoadLibraryA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
SetLastError
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapSize
SetUnhandledExceptionFilter
TlsAlloc
user32
ShowWindow
CharNextA
DefWindowProcA
DispatchMessageA
TranslateMessage
wsprintfW
EnumWindows
GetClassNameA
GetLastActivePopup
MessageBoxW
IsIconic
SetForegroundWindow
GetWindowTextW
LoadStringW
RegisterClassA
CreateWindowExA
GetMessageA
advapi32
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
RegEnumKeyExA
shell32
ShellExecuteA
ole32
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
oleaut32
SysFreeString
SysAllocString
SysStringLen
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
shlwapi
PathFindExtensionA
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE