mcsc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f5e19cbd37214efce0b3661aee3a697d_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5e19cbd37214efce0b3661aee3a697d_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f5e19cbd37214efce0b3661aee3a697d_JaffaCakes118
-
Size
2.0MB
-
MD5
f5e19cbd37214efce0b3661aee3a697d
-
SHA1
204b2903464da1246f7d17ac4e1b3dc29d52c10c
-
SHA256
49966bddd30b04612848830f8f1e71645bb9ce507b1924e55f5d258467bdcdf2
-
SHA512
07cce270e461445d1dae88776a38dd509d7959d3aeff3d6f1a18495997685853a68deb3bedd2fc797aa061baa94330bca121570cd5bd4802acf197ddc6cfda3f
-
SSDEEP
24576:WTpgm0F32ARUathnRFxLl+gCRO/VSbXoSYoXOoWI8TMy8N8RTAMqkX+87cA:i432sfRFxLutb4Z8T8TH3++
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5e19cbd37214efce0b3661aee3a697d_JaffaCakes118
Files
-
f5e19cbd37214efce0b3661aee3a697d_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
c0ad3406ce9cff1ba4a84071eef65822
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LoadLibraryW
FreeLibraryAndExitThread
SetThreadPriority
GetThreadPriority
GetCurrentThread
TerminateThread
DuplicateHandle
IsBadReadPtr
VirtualProtect
VirtualAlloc
VirtualFree
VirtualUnlock
VirtualLock
Thread32Next
Thread32First
CreateFileW
OpenThread
CreateThread
ResetEvent
CreateEventW
SetEvent
GetFileSize
GetProcessHeap
HeapAlloc
ReadFile
HeapFree
DeleteFileW
GetCurrentThreadId
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
FreeLibrary
lstrcmpiW
InterlockedIncrement
DisableThreadLibraryCalls
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetCurrentProcessId
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcAddress
GetCurrentProcess
SetLastError
GetSystemTimeAsFileTime
GetTickCount
GetTempPathW
GetTempFileNameW
ProcessIdToSessionId
CreateMutexW
WaitForSingleObject
CreateFileMappingW
GetLastError
OpenFileMappingW
MapViewOfFile
ReleaseMutex
lstrcmpW
GetModuleFileNameW
InterlockedDecrement
IsBadCodePtr
UnmapViewOfFile
CloseHandle
InterlockedExchangeAdd
InterlockedExchange
GetComputerNameW
lstrlenW
LocalFree
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
CreateToolhelp32Snapshot
SizeofResource
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
HeapCreate
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
FileTimeToSystemTime
ExitProcess
GetModuleHandleA
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RtlUnwind
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentDirectoryA
GetModuleFileNameA
SetCurrentDirectoryA
LoadLibraryA
HeapSize
HeapReAlloc
HeapDestroy
lstrcpynW
ReleaseSemaphore
Sleep
GetTimeZoneInformation
OpenProcess
lstrcatW
FileTimeToLocalFileTime
SetFilePointer
WriteFile
GlobalAlloc
GlobalFree
lstrlenA
FindClose
GlobalReAlloc
GlobalUnlock
GlobalLock
CreateSemaphoreW
lstrcpyW
CreateFileA
FindNextFileA
FindFirstFileA
lstrcpynA
GetSystemTime
GetACP
CreateDirectoryW
CreateMutexA
GlobalSize
GetLocaleInfoA
GetThreadLocale
GetVersionExA
user32
SetWindowLongA
PostThreadMessageW
PeekMessageW
MsgWaitForMultipleObjects
GetWindowThreadProcessId
CharLowerBuffW
UnregisterClassA
DispatchMessageW
IsWindow
GetWindowLongW
SystemParametersInfoW
GetLastInputInfo
GetWindowRect
GetDesktopWindow
GetSystemMetrics
GetWindowDC
IsWindowVisible
CharNextW
GetClassNameW
CharLowerW
GetForegroundWindow
IsWindowUnicode
CallWindowProcW
CallWindowProcA
DefWindowProcW
DefWindowProcA
KillTimer
SetTimer
SetWindowLongW
gdi32
CreateCompatibleBitmap
SelectObject
BitBlt
GetObjectW
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleDC
advapi32
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegGetKeySecurity
RegOpenKeyW
RegSetKeySecurity
RegQueryValueExW
LookupAccountNameW
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExW
RegCloseKey
RevertToSelf
OpenThreadToken
ImpersonateLoggedOnUser
CryptDestroyKey
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CryptEncrypt
CryptDecrypt
CryptDeriveKey
SetNamedSecurityInfoW
ConvertStringSidToSidW
CryptAcquireContextW
ole32
StringFromCLSID
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoInitializeEx
CoUninitialize
CreateStreamOnHGlobal
GetHGlobalFromStream
oleaut32
SafeArrayCreate
SysStringLen
SysStringByteLen
VarUI4FromStr
SysAllocStringLen
SafeArrayCreateVector
SafeArrayGetElement
SafeArrayPutElement
SafeArrayDestroy
SysAllocStringByteLen
VariantClear
VariantInit
VarBstrCmp
SafeArrayUnaccessData
SafeArrayAccessData
SysAllocString
SysFreeString
shlwapi
PathStripPathW
PathFileExistsW
SHCreateStreamOnFileW
wtsapi32
WTSOpenServerW
WTSQuerySessionInformationW
WTSFreeMemory
WTSCloseServer
netapi32
NetApiBufferFree
NetWkstaUserEnum
psapi
GetModuleFileNameExW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 788KB - Virtual size: 785KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ