k:\ProjectS\VC9\AuBK_DLL\Release\AuBK.pdb
Behavioral task
behavioral1
Sample
2948edd9eb0a0eaef0e593bb00eb7d8a_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2948edd9eb0a0eaef0e593bb00eb7d8a_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2948edd9eb0a0eaef0e593bb00eb7d8a_JaffaCakes118
-
Size
875KB
-
MD5
2948edd9eb0a0eaef0e593bb00eb7d8a
-
SHA1
a1a7128f77a213589ceab1e9cf7d20b6ff3afab8
-
SHA256
710bbd1a4c197d7cb030d2f46aa002baf34b6dcf4d8dbcaa49578015a37c195c
-
SHA512
8c23bd4bc9107b2a7820ff87363b90b65c6da2964d7e7f5d70308a75c256a26527b68efdd28fc610bf55b1fa5a16807e5dfc180cca1ea406d067454270412af5
-
SSDEEP
24576:XO1236t8Bsxm2LxI+tLy/dvrd3UU7kW+Rh/1N:+Q36qUqkudvrd3UtzRJ1N
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2948edd9eb0a0eaef0e593bb00eb7d8a_JaffaCakes118
Files
-
2948edd9eb0a0eaef0e593bb00eb7d8a_JaffaCakes118.dll windows:5 windows x86 arch:x86
b9a896acc7723c0deb622778c8d0dd08
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetPrivateProfileStringA
RaiseException
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
VirtualAlloc
HeapReAlloc
SetStdHandle
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
UnmapViewOfFile
CloseHandle
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
GetTempPathA
GetSystemDirectoryA
lstrlenA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
MapViewOfFile
GetLastError
CreateFileMappingA
CreateFileA
ReadFile
SetFilePointer
OpenFileMappingA
CreateThread
EnterCriticalSection
GetCurrentProcess
FindCloseChangeNotification
Sleep
FindNextChangeNotification
WaitForSingleObject
FindFirstChangeNotificationA
VirtualProtect
WriteProcessMemory
MultiByteToWideChar
lstrlenW
GetCurrentProcessId
SetCurrentDirectoryA
ReleaseMutex
OpenMutexA
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
lstrcatA
GetProcAddress
LoadLibraryA
GlobalFree
GlobalAlloc
GetFileType
GetFileSize
TerminateThread
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FileTimeToSystemTime
InterlockedIncrement
GetTickCount
DeleteFileA
HeapFree
WriteFile
GetModuleHandleW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
HeapAlloc
LocalAlloc
CreateEventA
SuspendThread
SetEvent
ResumeThread
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
GetModuleFileNameA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
lstrcmpA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
GetProcessHeap
WideCharToMultiByte
user32
DestroyMenu
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
UnregisterClassA
SetCursor
GetMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
ShowWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetWindowTextA
SetMenu
SetForegroundWindow
ExitWindowsEx
IsWindowVisible
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
GetActiveWindow
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
SendMessageA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PeekMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
RegisterClassExA
wsprintfA
PostQuitMessage
EnableWindow
RegisterWindowMessageA
gdi32
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
DeleteDC
GetStockObject
RestoreDC
GetDeviceCaps
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
ScaleWindowExtEx
SaveDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
StrToIntW
StrToIntA
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
wsock32
connect
socket
closesocket
WSAStartup
gethostbyname
WSACleanup
htons
getpeername
WSASetLastError
psapi
GetModuleInformation
GetMappedFileNameA
iphlpapi
GetIfTable
ws2_32
WSCGetProviderPath
WSCEnumProtocols
imagehlp
ImageDirectoryEntryToData
Exports
Exports
StartHook
StopHook
send_en
Sections
.text Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 28KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SHARED Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp1 Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE