d:\PLAYGROUND\SMART_LOCK_V2\release\BPassDLL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f30eb81380b48a111df857c17bf26ade_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f30eb81380b48a111df857c17bf26ade_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f30eb81380b48a111df857c17bf26ade_JaffaCakes118
-
Size
304KB
-
MD5
f30eb81380b48a111df857c17bf26ade
-
SHA1
87975d9a5bf7755715fd89aa3ba9430a9a1ecbba
-
SHA256
a778be72ecac9f8319d81777a51c467529f1c5269f22bafe23fd42e1c01978ce
-
SHA512
ea51412886b567e746c99333f20242277d38559a159551dde9ca296570509f5a0c8aeed8ac1395f020972f5d15d55be4d923b85d2ee07d0c1e25fda0466853d1
-
SSDEEP
6144:itGzoirMw2DIgRkXAD/4nq3bWkjRoR5qbYRqzK:itO0IgJ/4nqikSqb/m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f30eb81380b48a111df857c17bf26ade_JaffaCakes118
Files
-
f30eb81380b48a111df857c17bf26ade_JaffaCakes118.dll windows:4 windows x86 arch:x86
eca9e8e6a125bd9ba9da3b264ac1e6c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
kernel32
GetCommandLineA
RtlUnwind
ExitProcess
RaiseException
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
GetModuleHandleA
WritePrivateProfileStringW
GlobalFlags
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
LocalFree
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalUnlock
GlobalFree
FreeResource
GetCurrentProcessId
GlobalAddAtomW
CloseHandle
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
InterlockedDecrement
GetModuleHandleW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcAddress
SetLastError
MulDiv
HeapFree
FormatMessageW
lstrlenW
GetProcessHeap
HeapAlloc
GetLastError
LoadLibraryW
GetModuleFileNameW
FreeLibrary
HeapDestroy
user32
DestroyMenu
EndPaint
BeginPaint
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
GetSysColorBrush
ClientToScreen
UnregisterClassW
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowTextLengthW
SetWindowPos
SetFocus
ShowWindow
SetWindowLongW
GetDlgCtrlID
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
GetWindow
GetDesktopWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
PostMessageW
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
ReleaseDC
GetDC
GetWindowRect
EnableScrollBar
MessageBoxW
EnableWindow
SendMessageW
GetWindowTextW
UnregisterClassA
gdi32
GetStockObject
OffsetViewportOrgEx
DeleteDC
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
CreateBitmap
GetDeviceCaps
TextOutW
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetObjectW
SetBkColor
SetTextColor
GetClipBox
SetViewportExtEx
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyW
RegCloseKey
RegOpenKeyW
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
GBTBIOSPASSA
GBTBIOSPASSW
Sections
.text Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ