DirectDB.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4396db7a1d3c41b0333e487f0fa11868.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4396db7a1d3c41b0333e487f0fa11868
-
Size
147KB
-
MD5
4396db7a1d3c41b0333e487f0fa11868
-
SHA1
af5aa0eb1b8351c519e8ef0b203ebd7c560fff50
-
SHA256
6c7ca6f35472bbe6ce9dd03fcb3c70155f2eb1c92d88d8c1f5dacb8b31daa00b
-
SHA512
12fbead1a66174feabb72a689168e28559f7155fe942cffc28011ea97769c15ed566a8fc7bf900a91919cc1fb0a3edef66dc1331b72ceff963d2e3fd0d97925d
-
SSDEEP
3072:5ODZGx4N+MIcFbeC8qP1bEtYn1TjeGna3wCkqFDHYvSiAoX4:Egx4NnVbGqPqKFqSvSiW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4396db7a1d3c41b0333e487f0fa11868
Files
-
JaffaCakes118_4396db7a1d3c41b0333e487f0fa11868.dll regsvr32 windows:5 windows x86 arch:x86
0978a9b968bad9db283d2887c2c8af3d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
RegCloseKey
shlwapi
PathRemoveFileSpecA
StrCmpW
PathRenameExtensionW
PathFileExistsW
StrToIntExA
StrStrIA
StrStrA
StrCpyNW
StrCmpIW
ord80
PathFindFileNameW
ord158
ord125
SHRegGetValueW
kernel32
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
VirtualProtect
DeleteCriticalSection
DisableThreadLibraryCalls
GetSystemInfo
InitializeCriticalSection
GetVersionExA
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
GetStringTypeExA
IsDBCSLeadByte
lstrcmpA
CloseHandle
WaitForSingleObject
SetEvent
CreateThread
CreateEventA
lstrlenA
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
SetLastError
GetLastError
GetFullPathNameA
GetFullPathNameW
CreateMutexA
CreateMutexW
CreateFileA
CreateFileW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
OpenFileMappingA
OpenFileMappingW
CreateFileMappingA
CreateFileMappingW
MoveFileA
MoveFileW
DeleteFileA
DeleteFileW
LocalFree
LocalAlloc
UnmapViewOfFile
FlushViewOfFile
ReleaseMutex
GetTickCount
IsBadReadPtr
HeapAlloc
HeapFree
GetCurrentThreadId
RtlMoveMemory
Sleep
GetCurrentProcessId
SetFileTime
GetSystemTimeAsFileTime
HeapDestroy
SetEndOfFile
SetFilePointer
HeapCreate
FreeLibrary
GetProcAddress
LoadLibraryA
MapViewOfFile
GetFileSize
CompareFileTime
GetEnvironmentVariableA
lstrcpynA
GetModuleFileNameA
TlsSetValue
GetCommandLineA
ExitProcess
GetModuleHandleA
TlsFree
TlsGetValue
TlsAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
VirtualFree
WriteFile
RtlUnwind
InterlockedExchange
VirtualQuery
UnhandledExceptionFilter
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
ole32
CoGetMalloc
CoCreateInstance
user32
TranslateMessage
GetMessageA
SetTimer
CharLowerBuffA
DispatchMessageA
PostMessageA
PeekMessageA
SendMessageTimeoutA
IsWindow
GetDesktopWindow
RegisterClassA
GetClassInfoA
CreateWindowExA
KillTimer
DestroyWindow
GetWindowLongA
SetWindowLongA
DefWindowProcA
PostThreadMessageA
UnregisterClassA
CharUpperA
CharLowerBuffW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE