D:\CodeProject\DiskProject\PassDiskProtect\Release\Reg_Module.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f4c7407024f21918e5a73d85e8ea47c0_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4c7407024f21918e5a73d85e8ea47c0_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f4c7407024f21918e5a73d85e8ea47c0_JaffaCakes118
-
Size
277KB
-
MD5
f4c7407024f21918e5a73d85e8ea47c0
-
SHA1
44e154f3269e50cbfc30a0ebb65ae8bae7924af5
-
SHA256
e3a9b6b7e90456dec324e0b7ae6faba545b796678a998e5c447ad9f025a167a9
-
SHA512
8ad1554d4244b325fcbdff1efd9f2a4a93f84e0941030932a159400967d8a17804448f2a36246d4c58dcad221d5f89d671a76d14d8a8d0d6a2c754f65287db63
-
SSDEEP
3072:MTeHRDSCSRoniFeQWZ2yIY3A9wAy+ZtQjh6qh+NmjiJeKGP15I/a4uHEHcYg:5OCuoniFe7ZyYwqR+tQl6qSm8ea/8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4c7407024f21918e5a73d85e8ea47c0_JaffaCakes118
Files
-
f4c7407024f21918e5a73d85e8ea47c0_JaffaCakes118.dll windows:5 windows x86 arch:x86
5589dc5deac7ef208ca8ec717334aea3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapAlloc
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
Sleep
ExitProcess
SetStdHandle
GetFileType
HeapSize
HeapCreate
HeapDestroy
VirtualFree
GetACP
GetTimeZoneInformation
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetFullPathNameA
GetCurrentProcess
DuplicateHandle
GetFileSize
UnlockFile
LockFile
FlushFileBuffers
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalAddAtomA
GlobalFlags
WritePrivateProfileStringA
GlobalGetAtomNameA
InterlockedIncrement
GetModuleHandleW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
GetModuleFileNameW
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
GetCurrentProcessId
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetProcAddress
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
lstrlenA
GetFileSizeEx
SetEndOfFile
GetLastError
DeleteFileA
GetVolumeInformationA
SetFilePointer
WriteFile
ReadFile
CreateFileA
CloseHandle
GetModuleHandleA
GetCommandLineA
FindResourceA
LoadResource
LockResource
SizeofResource
IsValidCodePage
WideCharToMultiByte
user32
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
LoadCursorA
GetSystemMetrics
GetSysColor
GetSysColorBrush
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
UnhookWindowsHookEx
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EnableWindow
ReleaseDC
GetDC
GetClientRect
CopyRect
IsWindow
PostMessageA
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SendMessageA
DestroyMenu
CharUpperA
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetDlgItem
GetTopWindow
DrawTextA
DestroyWindow
CreateWindowExA
gdi32
SetMapMode
GetClipBox
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueA
RegOpenKeyA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
oleaut32
VariantChangeType
VariantClear
VariantInit
Exports
Exports
E_Serial_CheckRegister
E_Serial_Register
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ