d:\NPS_VSS_ROOT\NPS\bin\release\program files\NPSDCAGMOBEX.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0fcef7b8c45422fa542ecc69ad696eb4_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0fcef7b8c45422fa542ecc69ad696eb4_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
0fcef7b8c45422fa542ecc69ad696eb4_JaffaCakes118
-
Size
920KB
-
MD5
0fcef7b8c45422fa542ecc69ad696eb4
-
SHA1
625f875f5557851ef417d833688b642cea73f0d5
-
SHA256
fe2fbafa8d0b75ed941e6e41e1026c0d4ce4f09a78e208ac30c801114d2de444
-
SHA512
f74081bf87c4b1851b4051de0bc632390d1bc85f14bcf830878f56b0a312170ec66eff1a981f885614f39a980c8e32d7012fc0b369a7c5f14c26f40fbe4fd100
-
SSDEEP
12288:Vrp9NRa3YKRa4sxcorHGgRQc4vmffhv7sXJu7UVlHbrSD7bnjImwYAOxjpP:Vrp923OGwemHhvdAVlHbrSDXjIFYx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fcef7b8c45422fa542ecc69ad696eb4_JaffaCakes118
Files
-
0fcef7b8c45422fa542ecc69ad696eb4_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
f030c54fbcb19a422d6bfd951661182f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mobexdll
MObex_Init
MObex_RegisterCustomCB
MObex_SetConnected
MObex_DeInit
MObex_SendObject
MObex_SetOBEXPacketSize
kernel32
SetErrorMode
GlobalFlags
CompareStringW
WritePrivateProfileStringW
GetVersionExA
LoadLibraryA
GlobalFindAtomW
GetFileAttributesW
GetFileTime
RtlUnwind
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
ExitProcess
TlsFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetModuleFileNameA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
ReadFile
FindFirstFileW
FileTimeToLocalFileTime
FindNextFileW
FindClose
GetModuleHandleA
GlobalAddAtomW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryW
CompareStringA
InterlockedExchange
lstrcmpW
FileTimeToSystemTime
GetCurrentProcessId
lstrcmpA
FreeLibrary
GetModuleHandleW
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
SetLastError
OpenFileMappingW
RaiseException
Sleep
CreateDirectoryW
RemoveDirectoryW
DeleteFileW
CreateEventW
SetEvent
QueryPerformanceFrequency
QueryPerformanceCounter
GetFileSize
SetFilePointer
CreateFileW
IsBadReadPtr
UnmapViewOfFile
CloseHandle
GetProcessHeap
HeapFree
GetLastError
OutputDebugStringA
MapViewOfFile
GetThreadLocale
SetThreadLocale
SystemTimeToTzSpecificLocalTime
lstrlenA
WideCharToMultiByte
GetTimeZoneInformation
MultiByteToWideChar
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
lstrlenW
InterlockedDecrement
InterlockedIncrement
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringW
HeapSize
user32
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
RegisterWindowMessageW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
ShowWindow
SetWindowLongW
IsWindow
UnregisterClassA
UnregisterClassW
GetSubMenu
GetMenuItemCount
GetDlgItem
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
DestroyMenu
DefWindowProcW
GetMenuItemID
GetMenuState
UnhookWindowsHookEx
MessageBoxW
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongW
GetParent
SendMessageW
GetWindowThreadProcessId
GetWindowTextW
PostQuitMessage
PostMessageW
CheckMenuItem
EnableMenuItem
ModifyMenuW
GetFocus
LoadBitmapW
LoadCursorW
GetSysColorBrush
CharUpperW
GetSystemMetrics
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
gdi32
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
DeleteDC
SetTextColor
ScaleViewportExtEx
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegEnumKeyW
RegQueryValueW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
shlwapi
PathFindFileNameW
PathFileExistsW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
ole32
CoCreateGuid
StringFromGUID2
CoCreateInstance
OleRun
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
GetErrorInfo
SysStringLen
LoadRegTypeLi
LoadTypeLi
SetErrorInfo
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
VariantChangeType
VarUdateFromDate
SafeArrayDestroy
SafeArrayCopy
VariantCopy
VariantClear
VariantInit
SafeArrayGetVartype
atl80
ord64
ord32
ord30
ord23
ord61
ord58
ord31
ord10
ord11
ord15
ord18
ord22
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.calinfo Size: 4KB - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE