f:\work\0047.BHO\bho\BHO_full_tbws\release\vmmreg32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
04402045a46aa7c1a46adf17c775d84d_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
04402045a46aa7c1a46adf17c775d84d_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
04402045a46aa7c1a46adf17c775d84d_JaffaCakes118
-
Size
260KB
-
MD5
04402045a46aa7c1a46adf17c775d84d
-
SHA1
5baa0bf6ee417aa15fc9bb26d06cc0202aa396fb
-
SHA256
60b38c6d54bca68644290a535ab81bdd9c87b2eeb65c94bc79a359184065b77b
-
SHA512
733ab8d5cf47cfb8720180330035c82ad1ad64df21f6047b5a4fe312cee800201bb2cbea8616ba80801ae96ff113cf16e7e849e6360be5b31cee15be4052d5b6
-
SSDEEP
3072:s4z9XYZ7YJCTC32aFQQMLEbHtW3ftp50jErDZ2jIL:fY9vC3t3U3xus
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04402045a46aa7c1a46adf17c775d84d_JaffaCakes118
Files
-
04402045a46aa7c1a46adf17c775d84d_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
d13f5bd5581e5564a77732be2f766386
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
winhttp
WinHttpOpen
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpCrackUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetDefaultProxyConfiguration
WinHttpCloseHandle
WinHttpConnect
WinHttpOpenRequest
WinHttpSetTimeouts
kernel32
GetLastError
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
lstrlenA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiW
GetModuleFileNameW
CreateDirectoryW
InterlockedIncrement
InterlockedDecrement
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
SetThreadLocale
GetThreadLocale
GetModuleHandleExW
DisableThreadLibraryCalls
LockResource
GetProcAddress
Sleep
WriteFile
ReadFile
GlobalFree
GetTickCount
SetFilePointer
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCurrentProcess
FreeLibrary
CloseHandle
SetEnvironmentVariableA
GetWindowsDirectoryW
GetConsoleMode
GetStringTypeA
GetStringTypeW
LoadLibraryA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
CompareStringA
CompareStringW
FindResourceExW
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapCreate
VirtualAlloc
VirtualFree
GetTimeZoneInformation
GetDateFormatA
GetTimeFormatA
IsValidCodePage
GetOEMCP
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
RtlUnwind
GetCurrentProcessId
GetCurrentThreadId
GetCommandLineA
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
TerminateProcess
user32
CharNextW
UnregisterClassA
advapi32
OpenSCManagerW
GetUserNameW
RegEnumKeyExW
RegEnumValueW
RegQueryValueExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegOpenKeyExW
RegSaveKeyW
CreateServiceW
OpenServiceW
StartServiceW
CloseServiceHandle
ole32
CoCreateInstance
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
LoadRegTypeLi
DispCallFunc
VariantClear
VariantInit
RegisterTypeLi
SysStringLen
shlwapi
SHRegCreateUSKeyW
SHRegSetUSValueW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ