Static task
static1
Behavioral task
behavioral1
Sample
15066456dd232887262a7ee22a4e64cf_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
15066456dd232887262a7ee22a4e64cf_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
15066456dd232887262a7ee22a4e64cf_JaffaCakes118
-
Size
252KB
-
MD5
15066456dd232887262a7ee22a4e64cf
-
SHA1
425e7cf09f34c36128dd8b6cf6984f6a58cc44e9
-
SHA256
998315479ed007fdd545ee90529b5f3bfb2c816909f1f8e4a0806866d370b96a
-
SHA512
01b5b43a4f0a9b0f92e02ff1271e74b3fb02e876c466c3a577cad7a909cd04f5b025a2b4005f0ac175bb963024437c6423773efd65b3eb3537997672c105b971
-
SSDEEP
6144:60hQXzY/mPKxDa1Zj3eeQxel7JMYoAq9H:rQX1oazzZ9MYoAq9H
Malware Config
Signatures
Files
-
15066456dd232887262a7ee22a4e64cf_JaffaCakes118.dll windows:4 windows x86 arch:x86
5061eba02307417409e90b9969d27db7
Code Sign
04Certificate
IssuerCN=KISA RootCA 1,OU=Korea Certification Authority Central,O=KISA,C=KRNot Before24/08/2005, 08:05Not After24/08/2025, 08:05SubjectCN=KISA RootCA 1,OU=Korea Certification Authority Central,O=KISA,C=KR04:02Certificate
IssuerCN=yessignCA General Class 2,OU=AccreditedCA,O=yessign,C=krNot Before27/07/2010, 15:00Not After28/07/2011, 14:59SubjectCN=(주)플러그인 소프트,OU=code-sign+OU=02201007280002,O=yessign,C=krExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
27:84Certificate
IssuerCN=KISA RootCA 1,OU=Korea Certification Authority Central,O=KISA,C=KRNot Before30/04/2010, 01:50Not After30/04/2020, 01:50SubjectCN=yessignCA General Class 2,OU=AccreditedCA,O=yessign,C=krKey Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord3663
ord2414
ord1641
ord2379
ord3361
ord326
ord324
ord2167
ord5232
ord2393
ord3797
ord2147
ord2864
ord1180
ord268
ord1568
ord5268
ord1229
ord1175
ord1567
ord6141
ord713
ord5683
ord414
ord2614
ord4277
ord4278
ord6662
ord2763
ord922
ord6283
ord6282
ord940
ord5859
ord859
ord3984
ord2754
ord5875
ord5450
ord6394
ord5440
ord6383
ord3619
ord6055
ord1776
ord5290
ord3721
ord795
ord4275
ord755
ord470
ord5787
ord284
ord640
ord323
ord2405
ord1200
ord6199
ord3089
ord2859
ord3573
ord2860
ord3571
ord1640
ord5785
ord3402
ord567
ord3610
ord4622
ord2784
ord5710
ord539
ord465
ord2841
ord2107
ord4396
ord3574
ord609
ord6880
ord3626
ord3646
ord5593
ord5631
ord3438
ord3584
ord543
ord803
ord665
ord5442
ord3318
ord5186
ord354
ord6021
ord5651
ord3127
ord3616
ord350
ord3126
ord3613
ord3790
ord690
ord1988
ord5207
ord389
ord1105
ord1979
ord6385
ord6869
ord5356
ord6059
ord536
ord1980
ord3181
ord3178
ord4058
ord2781
ord2770
ord668
ord356
ord6663
ord4080
ord3079
ord6877
ord4202
ord2764
ord2818
ord535
ord541
ord924
ord801
ord3811
ord800
ord540
ord2915
ord5572
ord1247
ord1199
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord3706
ord5241
ord4376
ord4853
ord4710
ord2645
ord6143
ord6197
ord6215
ord6380
ord4317
ord2642
ord4234
ord2302
ord3597
ord4425
ord4627
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord4407
ord4078
ord6052
ord2514
ord4998
ord5265
ord6453
ord413
ord4168
ord6302
ord711
ord641
ord860
ord912
ord397
ord4188
ord5608
ord6781
ord699
ord939
ord3337
ord941
ord551
ord4129
ord823
ord825
ord6883
ord5861
ord858
ord537
ord1116
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord6467
ord815
ord3738
ord561
ord2575
ord4424
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord656
ord4274
msvcrt
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
sprintf
strcat
time
localtime
strftime
_mbscmp
malloc
free
qsort
tolower
strtoul
sqrt
memmove
strncpy
strcpy
isdigit
_ftol
memset
memcpy
fopen
fseek
ftell
fclose
fread
strtol
_except_handler3
_mbsicmp
atoi
exit
strstr
__CxxFrameHandler
abs
_strnicmp
kernel32
LocalFree
GetCurrentProcess
GetProcessHeap
HeapAlloc
HeapFree
RemoveDirectoryA
GetTempPathA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
CreateFileA
CreateProcessA
GetExitCodeProcess
GetShortPathNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetLastError
MoveFileA
QueryPerformanceFrequency
QueryPerformanceCounter
WideCharToMultiByte
GetVersionExA
CreateDirectoryA
SizeofResource
GlobalLock
GlobalUnlock
MulDiv
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
GetProcAddress
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
ReadProcessMemory
VirtualFreeEx
GetExitCodeThread
lstrcpyA
GlobalAlloc
GlobalFree
LockResource
FindResourceA
LoadResource
FreeResource
GetModuleFileNameA
GetCurrentThreadId
lstrcatA
OutputDebugStringA
MultiByteToWideChar
OpenProcess
TerminateProcess
CloseHandle
WritePrivateProfileStringA
lstrlenA
GetCurrentProcessId
lstrcmpiA
GetTickCount
CreateThread
DeleteFileA
ExpandEnvironmentStringsA
Sleep
LocalAlloc
user32
SetWindowLongA
GetWindowTextA
SetCursor
GetCursorPos
WindowFromPoint
LoadCursorA
UnionRect
OffsetRect
PtInRect
CopyRect
CopyImage
GetSysColor
UpdateWindow
IsRectEmpty
ScreenToClient
GetDC
ReleaseDC
GetClassNameA
EnumChildWindows
PeekMessageA
ShowWindow
PostMessageA
SetFocus
SetWindowTextA
SetClassLongA
GetClassLongA
GetDesktopWindow
GetWindowLongA
SendMessageA
IsWindow
GetFocus
GetWindowThreadProcessId
FindWindowA
wvsprintfA
wsprintfA
MessageBoxA
GetMonitorInfoA
MonitorFromPoint
IsWindowEnabled
GetActiveWindow
SetActiveWindow
EnableWindow
CallWindowProcA
GetParent
keybd_event
SetTimer
InvalidateRect
GetClientRect
GetWindowRect
SetWindowRgn
AnimateWindow
gdi32
GetObjectA
GetMapMode
CreateBitmap
CreateRoundRectRgn
DeleteObject
GetTextExtentPoint32A
GetTextMetricsA
CreateFontA
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
PatBlt
BitBlt
StretchBlt
advapi32
ControlService
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAce
InitializeAcl
AllocateAndInitializeSid
RegQueryInfoKeyA
RegSetKeySecurity
RegGetKeySecurity
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
RegEnumKeyA
RegDeleteKeyA
RegSetValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
DeleteService
FreeSid
shell32
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetFileInfoA
ShellExecuteA
comctl32
_TrackMouseEvent
ole32
CreateStreamOnHGlobal
olepro32
ord251
oleaut32
VariantClear
SysAllocStringLen
SysFreeString
urlmon
URLDownloadToFileA
iphlpapi
GetAdaptersInfo
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
oleacc
AccessibleObjectFromWindow
imm32
ImmGetContext
ImmReleaseContext
ImmNotifyIME
shlwapi
SHDeleteKeyA
SHDeleteValueA
Exports
Exports
Auto_AfterInstall
Auto_AfterPatch
Auto_AfterUninstall
Auto_BHOLog
Auto_BeforeNavigate
Auto_CloudWebInstall
Auto_ConnectBrowser
Auto_DocumentComplete
Auto_DownloadLicence
Auto_ExecDaily
Auto_NavigateComplete
Auto_NewWindow3
Auto_PatchTry
Auto_Quit
Auto_ServiceExecute
Auto_SetupTry
Auto_Test
HookIEAddressBar
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ