gptext.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fd1debbbd93f51cd49701b2fa91e688f_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd1debbbd93f51cd49701b2fa91e688f_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
fd1debbbd93f51cd49701b2fa91e688f_JaffaCakes118
-
Size
281KB
-
MD5
fd1debbbd93f51cd49701b2fa91e688f
-
SHA1
4e042446b9d48589c9d67461e7b9e36909e2e0d0
-
SHA256
e8f4ad76dbe43e4ed696c65c251a523e91c7ae862e61581681614fb0dd26eaef
-
SHA512
03d34e31be9fc45ffbb18a76f93bcaa5ee8d07e5b59a75ac6d802f43ebc0c584fcbc8a38b4299e72eab02bcaf5ee547e6ea020041874b57d58a0676354cf1f29
-
SSDEEP
6144:rXcOz2IB/yVicGQXKuipNfpJbNjv5kYobNZhB+O:rXBzfB/yVtG7usfpJbdmYIThf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd1debbbd93f51cd49701b2fa91e688f_JaffaCakes118
Files
-
fd1debbbd93f51cd49701b2fa91e688f_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
af85f86354d5c042edf2f19545f9767f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
wcscpy
_itow
_adjust_fdiv
malloc
_initterm
??2@YAPAXI@Z
wcscmp
wcscat
wcschr
wcslen
iswctype
wcsncpy
_wtol
_wcsicmp
_ftol
_except_handler3
free
wcstoul
_wtoi
??3@YAXPAX@Z
ntdll
RtlInitUnicodeString
RtlCopySid
RtlLengthSid
NtQueryInformationToken
RtlConvertSidToUnicodeString
RtlFreeUnicodeString
kernel32
CreateFileW
ExpandEnvironmentStringsW
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
GetLastError
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GetModuleHandleA
GetModuleHandleW
GetProcAddress
SetFileAttributesW
WritePrivateProfileStringW
CopyFileW
GetPrivateProfileIntW
lstrcpynW
lstrcatW
lstrcpyW
GetFileAttributesExW
FindClose
FindNextFileW
CompareFileTime
FindFirstFileW
LocalFree
WideCharToMultiByte
LocalAlloc
SetFilePointer
GlobalReAlloc
GlobalFree
GetPrivateProfileSectionW
GlobalAlloc
GetTimeFormatW
GetDateFormatW
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalReAlloc
CompareStringW
InterlockedDecrement
GlobalLock
GlobalUnlock
LoadLibraryW
GetModuleFileNameW
OutputDebugStringA
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
LoadLibraryA
CreateEventW
GetTickCount
WaitForSingleObject
FormatMessageW
FreeLibrary
GetUserDefaultLangID
DeleteFileW
MultiByteToWideChar
ReadFile
GetFileSize
GetTempFileNameW
GetTempPathW
SystemTimeToFileTime
SetEvent
ResetEvent
FreeLibraryAndExitThread
Sleep
SetThreadPriority
CreateThread
DeviceIoControl
GetPrivateProfileSectionNamesW
WritePrivateProfileSectionW
GetPrivateProfileStringW
OpenEventW
CreateDirectoryW
GetCurrentThread
LoadLibraryExA
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
lstrlenW
WriteFile
CloseHandle
SetLastError
DebugBreak
lstrcmpiW
user32
SetWindowPos
GetClientRect
SetScrollPos
GetScrollPos
SetScrollRange
ReleaseDC
GetDC
CheckDlgButton
GetSystemMetrics
EndDialog
IsDlgButtonChecked
RegisterClassW
CreateWindowExW
DialogBoxParamW
LoadBitmapW
MessageBoxW
MessageBeep
RegisterWindowMessageW
GetWindowPlacement
GetScrollRange
SetDlgItemInt
ShowWindow
SendDlgItemMessageW
GetDlgItemTextW
IsWindowEnabled
GetWindow
UnhookWindowsHookEx
GetKeyState
SetWindowsHookExW
GetDlgItemInt
LoadIconW
DestroyIcon
LoadImageW
ShowScrollBar
CheckRadioButton
GetNextDlgTabItem
DefWindowProcW
MsgWaitForMultipleObjects
PeekMessageW
DispatchMessageW
TranslateMessage
SetCursor
LoadCursorW
RegisterClipboardFormatW
SetWindowTextW
GetWindowTextLengthW
EnableWindow
SetFocus
CharNextW
LoadStringW
wsprintfW
wvsprintfW
CallNextHookEx
SetWindowLongW
GetWindowLongW
SetDlgItemTextW
PostMessageW
WinHelpW
GetParent
BringWindowToTop
DestroyWindow
GetDlgItem
GetFocus
SendMessageW
gdi32
SelectObject
DeleteObject
GetTextExtentPointW
advapi32
IsTextUnicode
RegEnumKeyExW
RegCreateKeyExW
RegDeleteValueW
RegCreateKeyW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteKeyW
ImpersonateLoggedOnUser
RegSetValueExW
RegOpenKeyExW
RegOpenKeyW
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
GetAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
SetThreadToken
OpenThreadToken
RegCloseKey
RegQueryValueExW
shell32
SHFileOperationW
ShellExecuteW
activeds
ord15
ord9
ole32
CoInitializeEx
CoInitialize
CoCreateInstance
StringFromGUID2
CreateStreamOnHGlobal
CoTaskMemAlloc
CoUninitialize
oleaut32
SafeArrayPutElement
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetElement
VariantClear
SysFreeString
SysAllocString
userenv
RsopFileAccessCheck
ord135
wsock32
gethostbyname
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GenerateScriptsGroupPolicy
ProcessIPSECPolicy
ProcessPSCHEDPolicy
ProcessScriptsGroupPolicy
ProcessScriptsGroupPolicyEx
ProcessWIRELESSPolicy
ScrRegGPOListToWbem
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ