dprx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fa5ac2d6d6b32fe129978e82c7f699d0_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fa5ac2d6d6b32fe129978e82c7f699d0_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
fa5ac2d6d6b32fe129978e82c7f699d0_JaffaCakes118
-
Size
276KB
-
MD5
fa5ac2d6d6b32fe129978e82c7f699d0
-
SHA1
9a2001ea20cf45bb87173a079a64efda24c8391b
-
SHA256
fd0ced98a324b3fdb484e10589dabb685ffa8c0a416289d9cfc2bae1f06d686f
-
SHA512
dda05be9d8f99d88bb08a46e5469f235825412f0821f119ddacc36a94cdd1c80dfbfccbc619339d777a0af50ce11948f66b3e68ba92249517f600cdc31f77468
-
SSDEEP
6144:DvQ4WOGj0F3HeABB4SVdCWi98LJKV3dgd:D/WOxuABBlLCWK8MVtgd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa5ac2d6d6b32fe129978e82c7f699d0_JaffaCakes118
Files
-
fa5ac2d6d6b32fe129978e82c7f699d0_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
65c327209e38abb6d547c3d53bef766c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CancelIo
WaitForMultipleObjects
CreateEventW
DuplicateHandle
TerminateThread
GetExitCodeThread
Sleep
FindClose
FindNextFileW
CreateFileW
FindFirstFileW
lstrcpyW
GetSystemTimeAsFileTime
GetTempPathW
FileTimeToSystemTime
GetTickCount
SetThreadPriority
GetCurrentThreadId
GetFileAttributesExW
GetFileTime
CompareFileTime
DeleteFileW
GetTempFileNameW
SetLastError
ReadFile
GetFileSize
MoveFileExW
FlushFileBuffers
WriteFile
SetFileAttributesW
LoadLibraryA
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
InterlockedExchange
SetFileTime
LocalAlloc
ProcessIdToSessionId
GetProcessHeap
HeapFree
HeapAlloc
GetCurrentThread
ReleaseMutex
CreateMutexW
FindResourceExW
LockResource
SetEndOfFile
DisableThreadLibraryCalls
lstrlenA
LoadLibraryW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
GetLastError
GetModuleFileNameW
GetSystemDirectoryW
lstrcmpiW
WaitForSingleObject
lstrcatA
CreateEventA
InterlockedDecrement
InterlockedIncrement
GetCurrentProcessId
ResetEvent
Process32FirstW
Process32NextW
CloseHandle
FreeLibrary
GetVersionExW
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
GetCurrentProcess
GetComputerNameW
lstrlenW
LocalFree
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GlobalSize
CreateMutexA
CreateDirectoryW
GetACP
GetSystemTime
lstrcpynA
OpenFileMappingW
CreateFileMappingW
CreateFileA
lstrcpynW
GetStringTypeW
CreateSemaphoreW
GetStringTypeA
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
HeapCreate
ExitProcess
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleA
VirtualProtect
SetEvent
SetSystemTime
CreateToolhelp32Snapshot
OpenProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CreateThread
ExitThread
RtlUnwind
GlobalLock
GlobalUnlock
GlobalReAlloc
VirtualAlloc
VirtualFree
ReleaseSemaphore
InterlockedExchangeAdd
UnmapViewOfFile
MapViewOfFile
lstrcatW
SetFilePointer
GlobalAlloc
GlobalFree
user32
CharNextW
KillTimer
SetTimer
GetWindowThreadProcessId
IsWindow
RegisterWindowMessageW
PostMessageW
CharLowerW
GetDesktopWindow
CharLowerBuffW
UnregisterClassA
SendMessageW
advapi32
GetTokenInformation
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
IsValidSid
DuplicateTokenEx
SetTokenInformation
ImpersonateLoggedOnUser
OpenThreadToken
RevertToSelf
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegGetKeySecurity
RegOpenKeyW
RegSetKeySecurity
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupAccountNameW
ConvertSidToStringSidW
RegOpenKeyExW
RegCloseKey
CryptDestroyKey
GetSidSubAuthority
GetSidSubAuthorityCount
CryptEncrypt
CryptDecrypt
CryptDeriveKey
SetNamedSecurityInfoW
ConvertStringSidToSidW
shell32
SHCreateDirectoryExW
SHGetFolderPathW
ole32
GetHGlobalFromStream
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoInitializeEx
CoTaskMemRealloc
StringFromCLSID
oleaut32
VarBstrCmp
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SysStringByteLen
SysAllocStringByteLen
VariantClear
VariantInit
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
VarBstrFromI4
SysAllocString
SysAllocStringLen
SysStringLen
VarBstrCat
SysFreeString
SafeArrayRedim
SafeArrayDestroy
SafeArrayPutElement
SafeArrayGetElement
VarI4FromStr
SafeArrayCreate
VarBstrFromR8
proxy
?SynchronizeTime@CProxy@@QAEJPAG@Z
?GeoLocate@CProxy@@QAEJXZ
?Close@CProxy@@QAEXXZ
?SendRemoteHttpRequest@CProxy@@QAEJPAGJPAUtagVARIANT@@1J10@Z
??1CProxy@@QAE@XZ
??0CProxy@@QAE@XZ
?LoadDll@CProxy@@QAEJPBG@Z
?Open@CProxy@@QAEJHPAX@Z
shlwapi
SHCreateStreamOnFileW
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
rpcrt4
UuidCreate
iphlpapi
NotifyAddrChange
wtsapi32
WTSCloseServer
WTSFreeMemory
WTSQuerySessionInformationW
WTSOpenServerW
netapi32
NetWkstaUserEnum
NetApiBufferFree
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ