e:\JinZQ\Hook开机启动\2-GameVersionUpdateDLL\Release\GameVersionUpdateDLL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2507b37eb5fd57982db8f58481923e3d_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2507b37eb5fd57982db8f58481923e3d_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
2507b37eb5fd57982db8f58481923e3d_JaffaCakes118
-
Size
292KB
-
MD5
2507b37eb5fd57982db8f58481923e3d
-
SHA1
a17c2ba5b555db786246bb8bf2b03187d5ecaa3b
-
SHA256
7743d3cca82eb77e60572a59780ecf3c3c0111a537a9f87f0034054c7fa0f121
-
SHA512
783a94e78b39438c2fd5c29338b612177ddeb2c81d438c53cf393898a9e079ba01326ef68ac74c0d6eb7b1033c731ac64bdd25dd5e5fbde1681998658f43e041
-
SSDEEP
6144:hmkl/qs4Xe+EP+QVPBhMmRvwe0/Y70g1vdbjHRgohTS9zME:hmSEbEWQVPrxZ0AQg1hjJhuCE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2507b37eb5fd57982db8f58481923e3d_JaffaCakes118
Files
-
2507b37eb5fd57982db8f58481923e3d_JaffaCakes118.dll windows:4 windows x86 arch:x86
88c84f00a28f609b74e15709b4f0147c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetCloseHandle
InternetGetConnectedState
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
winmm
waveOutGetVolume
waveOutSetVolume
waveOutOpen
timeGetTime
waveOutGetNumDevs
waveOutClose
kernel32
SetLastError
FileTimeToSystemTime
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedDecrement
SetErrorMode
GlobalFlags
InterlockedIncrement
GetCPInfo
GetOEMCP
RaiseException
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
ExitProcess
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
RtlUnwind
TerminateProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTimeZoneInformation
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
MulDiv
FormatMessageA
GlobalUnlock
GlobalFree
GetCurrentThread
GlobalLock
GlobalAlloc
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
lstrcpynA
GetModuleHandleA
LocalFree
CreateThread
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
MoveFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcessId
OpenProcess
VirtualProtectEx
WriteProcessMemory
CreateProcessA
Sleep
SystemTimeToFileTime
CreateFileA
SetFileTime
CloseHandle
SetFileAttributesA
CreateDirectoryA
GetPrivateProfileStringA
GetTickCount
WritePrivateProfileStringA
lstrcatA
WinExec
GetLocalTime
GetModuleFileNameA
MoveFileExA
lstrlenA
DeleteFileA
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
GetProcAddress
FreeLibrary
lstrcpyA
GetFullPathNameA
user32
DestroyMenu
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
GetSysColorBrush
LoadCursorA
CharNextA
IsRectEmpty
SetRect
CopyAcceleratorTableA
InvalidateRect
InvalidateRgn
SetCapture
ReleaseCapture
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
GetPropA
RemovePropA
GetFocus
SetFocus
IsChild
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
IsWindowVisible
GetClientRect
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
UnregisterClassA
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
PtInRect
GetWindow
GetSystemMetrics
GetWindowRect
FindWindowA
ClientToScreen
wsprintfA
KillTimer
SetTimer
SetWindowContextHelpId
MapDialogRect
SetPropA
GetDesktopWindow
EnumWindows
IsWindow
GetWindowThreadProcessId
FindWindowExA
GetParent
GetWindowTextA
SendMessageA
CharUpperA
PostThreadMessageA
EnableWindow
SendDlgItemMessageA
UpdateWindow
SetDlgItemTextA
SetForegroundWindow
WinHelpA
gdi32
SaveDC
RestoreDC
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
RectVisible
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
PtVisible
GetWindowExtEx
GetViewportExtEx
ExtTextOutA
DeleteObject
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
SetMapMode
TextOutA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
CoGetClassObject
OleInitialize
CLSIDFromProgID
CLSIDFromString
CoTaskMemAlloc
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoTaskMemFree
oleaut32
VariantChangeType
SafeArrayDestroy
VariantCopy
SysAllocStringByteLen
SysStringLen
VariantInit
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
ws2_32
inet_ntoa
gethostbyname
gethostname
WSAStartup
htons
closesocket
socket
htonl
bind
Exports
Exports
init
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ