Static task
static1
Behavioral task
behavioral1
Sample
31b5fed3788fc331d93c59aee4a8fde7_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
31b5fed3788fc331d93c59aee4a8fde7_JaffaCakes118
-
Size
79KB
-
MD5
31b5fed3788fc331d93c59aee4a8fde7
-
SHA1
67887c091626d414da9612c38e1abb0418471d48
-
SHA256
57e5685dbdbcb49955af5694e9f72dcb1c05e4546957fb92a9aa92177e0a823e
-
SHA512
b3c94c34f7b5aa77e164b19e3cf13050b833662240d3dcf61f985c4190d7e241c77c4a34b73169ea676e18e3dad6c56d1444c9405570312d7e334c71f78117a9
-
SSDEEP
1536:4kEsPTEcv01fNhfV3GVyapY5YJUzTrG96crz:49+T2JvlaoYJ0TS96cP
Malware Config
Signatures
Files
-
31b5fed3788fc331d93c59aee4a8fde7_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
4bc910d4108dbf611fc053f8eb186d57
Code Sign
3a:aa:24:d3:a7:9a:11:59:bd:5f:49:42:5d:b9:47:f4Certificate
IssuerCN=Root AgencyNot Before22/06/2009, 06:42Not After31/12/2039, 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media Player38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateThread
DisableThreadLibraryCalls
GetCurrentThreadId
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
lstrcpyA
lstrcatA
GetSystemTime
GetProcAddress
LoadLibraryA
FlushInstructionCache
GetCurrentProcess
DebugBreak
OutputDebugStringA
OpenProcess
CreateThread
CreateFileA
lstrlenW
GetFileSize
ReadFile
CloseHandle
GetVersionExA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
FreeLibrary
user32
wsprintfA
CharNextA
FindWindowA
DestroyWindow
DefWindowProcA
IsChild
GetFocus
EndPaint
PostMessageA
wvsprintfA
CallWindowProcA
GetWindowLongA
SetWindowLongA
LoadStringA
GetDC
ReleaseDC
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
BeginPaint
GetClientRect
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
oleaut32
SysFreeString
DispCallFunc
LoadRegTypeLi
SysStringLen
SysAllocString
LoadTypeLi
RegisterTypeLi
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
urlmon
URLDownloadToFileA
msvcrt
_adjust_fdiv
_initterm
_onexit
__dllonexit
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
_strcmpi
_ismbcdigit
wcslen
_purecall
_mbsicmp
_mbsrchr
_ismbcspace
srand
rand
_mbsstr
atoi
realloc
time
sprintf
_except_handler3
malloc
free
??3@YAXPAX@Z
??2@YAPAXI@Z
memmove
__CxxFrameHandler
shlwapi
PathFindFileNameA
PathFileExistsA
wininet
DeleteUrlCacheEntry
InternetGetConnectedState
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ