Static task
static1
Behavioral task
behavioral1
Sample
155f757eab5b236e4825b47a1e85bea8_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
155f757eab5b236e4825b47a1e85bea8_JaffaCakes118
-
Size
79KB
-
MD5
155f757eab5b236e4825b47a1e85bea8
-
SHA1
93ce31ea0736f8584be0dc9557444d7fb2eb7102
-
SHA256
7fde13484eb5a9bfa7d99b45f421c29a7be4e856334845f31c8daed1494162a1
-
SHA512
c241aebe9da02dc7a2bb7f443f774e3e9b54e5aa8530d07fadb52f95a93a880a3069852bd31930e549b9b7b0039037fecdd5a671f9fca4685dfd98e8c7a45092
-
SSDEEP
1536:6kA0zw6VoDQJ+1l/1zq4adQp8+QJUG905a+6Wr7:6Jyw6jMTydQTQJp9IX6Wn
Malware Config
Signatures
Files
-
155f757eab5b236e4825b47a1e85bea8_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
3b1687aaa25df48e9e374b4efd814d09
Code Sign
3a:aa:24:d3:a7:9a:11:59:bd:5f:49:42:5d:b9:47:f4Certificate
IssuerCN=Root AgencyNot Before22-06-2009 06:42Not After31-12-2039 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media Player38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15-06-2007 00:00Not After14-06-2012 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04-12-2003 00:00Not After03-12-2013 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemTime
TerminateThread
DisableThreadLibraryCalls
GetCurrentThreadId
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
lstrcpyA
CreateThread
FreeLibrary
GetProcAddress
LoadLibraryA
FlushInstructionCache
GetCurrentProcess
DebugBreak
OutputDebugStringA
OpenProcess
CreateFileA
GetFileSize
lstrlenW
ReadFile
CloseHandle
GetVersionExA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
lstrcatA
user32
wsprintfA
CharNextA
FindWindowA
DestroyWindow
DefWindowProcA
IsChild
GetFocus
EndPaint
PostMessageA
wvsprintfA
CallWindowProcA
GetWindowLongA
SetWindowLongA
LoadStringA
GetDC
ReleaseDC
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
BeginPaint
GetClientRect
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
oleaut32
SafeArrayGetUBound
SysFreeString
DispCallFunc
LoadRegTypeLi
SysStringLen
SysAllocString
LoadTypeLi
RegisterTypeLi
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
urlmon
URLDownloadToFileA
msvcrt
_adjust_fdiv
_initterm
_onexit
__dllonexit
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
_strcmpi
_ismbcdigit
wcslen
_purecall
_mbsicmp
_ismbcspace
srand
rand
_mbsstr
atoi
realloc
time
sprintf
_except_handler3
malloc
_mbsrchr
free
??3@YAXPAX@Z
??2@YAPAXI@Z
memmove
__CxxFrameHandler
shlwapi
PathFindFileNameA
PathFileExistsA
wininet
DeleteUrlCacheEntry
InternetGetConnectedState
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ