e:\DNF\Release\User23.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3375e6fa34b412653a23a5cd548da39b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3375e6fa34b412653a23a5cd548da39b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3375e6fa34b412653a23a5cd548da39b_JaffaCakes118
-
Size
383KB
-
MD5
3375e6fa34b412653a23a5cd548da39b
-
SHA1
676ee80d756ad0fd3a8d51a4861e5c3eebff3b48
-
SHA256
d21e2ab17fe0e780db66e83042b9267e3520c833a5e976dd76e2002ae02384cf
-
SHA512
a0a279211cbb1678bb56ebfdc63b37b96b58e028140a3fc3b407995834a584f872ebcf62d70baabb4422e31514d66adb52e94db2d57bfd95dc75bcd68dfbcedf
-
SSDEEP
6144:HyfWrQeJ8GFeb26nHi+H3BHkBtnMwHmFJXNFWcijnxA4B5/51BJFhzB6qMp7IWd0:SOrQFb2KH3BKMwHgGcqxA4B5/51fzBu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3375e6fa34b412653a23a5cd548da39b_JaffaCakes118
Files
-
3375e6fa34b412653a23a5cd548da39b_JaffaCakes118.dll windows:5 windows x86 arch:x86
427b516a810815538ac8e5e06adcf32a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCommandLineA
HeapAlloc
HeapFree
RtlUnwind
ExitProcess
RaiseException
HeapSize
HeapReAlloc
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetModuleHandleW
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
InterlockedIncrement
FormatMessageA
WritePrivateProfileStringA
GlobalFlags
GlobalGetAtomNameA
GlobalFindAtomA
MultiByteToWideChar
lstrcmpW
GetVersionExA
SetErrorMode
lstrlenA
TlsFree
GlobalFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalUnlock
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
InterlockedDecrement
GetModuleFileNameW
GlobalAddAtomA
GetCurrentProcessId
SetLastError
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
WideCharToMultiByte
CompareStringA
LockResource
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
CreateToolhelp32Snapshot
GetModuleHandleA
Process32Next
GetLastError
SizeofResource
WriteFile
Process32First
GetCurrentProcess
LoadResource
FindResourceA
CreateFileA
CreateThread
CloseHandle
OutputDebugStringA
OpenEventA
CreateEventA
Sleep
GetTickCount
SetEvent
WaitForSingleObject
LoadLibraryA
FreeEnvironmentStringsW
GetProcAddress
user32
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
ClientToScreen
ShowWindow
SetWindowTextA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassNameA
SetPropA
GetPropA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetWindowThreadProcessId
RegisterHotKey
IsWindowVisible
IsWindow
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetClassLongA
PeekMessageA
MessageBoxA
GetWindowTextA
GetWindowRect
GetMessageA
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
SendMessageA
GetParent
GetFocus
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
PostQuitMessage
PostMessageA
SetCursor
GetSystemMetrics
GetWindow
UnregisterClassA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
GetCursorPos
ValidateRect
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
RemovePropA
gdi32
GetStockObject
DeleteDC
ExtTextOutA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
CreateBitmap
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
DeleteObject
SetBkColor
SetTextColor
GetClipBox
Escape
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
StrStrIA
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Exports
Exports
Notify
St
Tr
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vimp Size: 1024B - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.upx0 Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.upx1 Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ