d:\VSS_Source\VC\BackgroundOperation\Source\BackgroundOperation\Release\BackgroundOperation.pdb
Static task
static1
Behavioral task
behavioral1
Sample
184a52ec30aaa2657a210c9648f7ed4a_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
184a52ec30aaa2657a210c9648f7ed4a_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
184a52ec30aaa2657a210c9648f7ed4a_JaffaCakes118
-
Size
265KB
-
MD5
184a52ec30aaa2657a210c9648f7ed4a
-
SHA1
b9fb9a8504b5795f73790080187c7a40547b5ccd
-
SHA256
9ec304721f6e2740f270bf09a9874f19d10d1153c8c983b701ba212589f952c0
-
SHA512
80826bcbe3119c43fcd64781ef5a96a8e5cc9f68fcba88f8d7530fcd65f2accd8da0880f9ea00353c64534151222464e6a6b19e714219680962f062fa95498dd
-
SSDEEP
3072:PRZAbYz9p1Xljm04U19NNc1nAoTGC9BRjmD6rTEEpGdF9BANyeBUxXEk78tG3It:pZok7x0ifC97jbrTEMQXtfYt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 184a52ec30aaa2657a210c9648f7ed4a_JaffaCakes118
Files
-
184a52ec30aaa2657a210c9648f7ed4a_JaffaCakes118.dll windows:4 windows x86 arch:x86
d25da80543b43a255d5a3d33419d741e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
iphlpapi
GetAdaptersInfo
psapi
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
kernel32
CreateEventW
CreateThread
CloseHandle
WaitForSingleObject
InterlockedIncrement
RaiseException
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
OpenProcess
CreateProcessW
lstrlenW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetTempPathW
GetTempFileNameW
GetWindowsDirectoryW
lstrcpyW
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
EnterCriticalSection
LeaveCriticalSection
CreateFileW
SetFilePointer
WriteFile
WideCharToMultiByte
WriteProcessMemory
GetCurrentProcess
GlobalAlloc
GetModuleHandleW
GetTickCount
SetLastError
lstrcmpW
GlobalLock
GlobalUnlock
FlushInstructionCache
MulDiv
MultiByteToWideChar
DeviceIoControl
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
ResumeThread
GetThreadContext
SetThreadContext
SuspendThread
GetStringTypeA
DeleteCriticalSection
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
ExitProcess
Sleep
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCommandLineA
GetSystemTimeAsFileTime
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
RtlUnwind
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
CompareStringA
CompareStringW
InitializeCriticalSection
SetEvent
GetLastError
GetCurrentThread
GetProcAddress
LoadLibraryW
GetCurrentThreadId
FreeLibrary
GetStringTypeW
HeapCreate
GetStdHandle
SetEnvironmentVariableA
ReadFile
LCMapStringW
GetModuleFileNameA
user32
CreateWindowExW
FillRect
CallWindowProcW
MoveWindow
GetDlgItem
InvalidateRect
GetWindowTextW
RegisterClassExW
InvalidateRgn
GetDC
SetFocus
GetFocus
RedrawWindow
CreateAcceleratorTableW
IsChild
GetClassInfoExW
DestroyAcceleratorTable
SetCapture
InflateRect
SetRect
PostMessageW
CharNextW
GetCursorPos
GetWindow
LoadCursorW
ClientToScreen
OffsetRect
GetParent
IsWindow
EnumChildWindows
GetClassNameW
ScreenToClient
DestroyWindow
EndPaint
BeginPaint
SetWindowPlacement
SetWindowLongW
GetWindowLongW
SetWindowTextW
SetWindowPos
GetClientRect
GetDesktopWindow
KillTimer
SetTimer
WaitForInputIdle
SendMessageW
PostThreadMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
CreateDialogParamW
DefWindowProcW
GetWindowThreadProcessId
FindWindowW
RegisterWindowMessageW
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
ReleaseDC
ReleaseCapture
GetSysColor
PtInRect
GetWindowTextLengthW
UnregisterClassA
gdi32
DeleteDC
CreateCompatibleDC
CreateSolidBrush
CreateCompatibleBitmap
SelectObject
DeleteObject
GetObjectW
BitBlt
GetDeviceCaps
GetStockObject
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
ole32
OleUninitialize
CLSIDFromString
OleInitialize
StringFromCLSID
CLSIDFromProgID
CoGetClassObject
CoTaskMemAlloc
OleLockRunning
StringFromGUID2
CoTaskMemFree
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
OleCreateFontIndirect
LoadTypeLi
LoadRegTypeLi
SysStringByteLen
DispCallFunc
SafeArrayGetUBound
SafeArrayGetLBound
VariantClear
SysStringLen
VariantCopy
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SysAllocStringLen
SysAllocString
SysFreeString
shlwapi
StrStrIW
UrlCanonicalizeW
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
wininet
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
Exports
Exports
SendStatisticDataOnInstall
fnClose
fnOpen
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ