Static task
static1
Behavioral task
behavioral1
Sample
384ecfca1f47fb0eab241c236f3838cf_JaffaCakes118.dll
Resource
win7-20240705-en
General
-
Target
384ecfca1f47fb0eab241c236f3838cf_JaffaCakes118
-
Size
53KB
-
MD5
384ecfca1f47fb0eab241c236f3838cf
-
SHA1
311a9d2595e6200e2c28c3bfca5f156d149abb29
-
SHA256
351f2ca8fbb9ef24dc4a3007318e3a4174cdd7d02afd75f8243743efbf18b528
-
SHA512
53c070efe5b67de0a94ca73342b2245ecf7ef2afb2e5a53852cb76449f5ebe792613bbf8cd17f1f9345ddbb0140855071d1865b32ccecd3afaae8609f82c9cf8
-
SSDEEP
768:pPPmhgNjc/P8kcaB8vTyYTjjZi25ziKWheuGkxZDghlHY4vjt:ZPudiLWsuGkDElY4vjt
Malware Config
Signatures
Files
-
384ecfca1f47fb0eab241c236f3838cf_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
ebdcea0f765312164083c7dceb001837
Code Sign
7d:87:fd:d2:76:85:1d:6b:b9:3e:35:ea:72:5b:98:6aCertificate
IssuerCN=Root AgencyNot Before16-09-2009 07:50Not After31-12-2039 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media PlayerSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetProcAddress
lstrcpyA
lstrcatA
GetCurrentThreadId
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
LeaveCriticalSection
DisableThreadLibraryCalls
CreateThread
TerminateThread
CloseHandle
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
GetModuleFileNameA
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
lstrlenA
MultiByteToWideChar
lstrlenW
InitializeCriticalSection
user32
wsprintfA
GetDC
DestroyWindow
PostMessageA
LoadStringA
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
BeginPaint
GetClientRect
EndPaint
CharNextA
ReleaseDC
GetFocus
IsChild
GetClassInfoExA
LoadCursorA
RegisterClassExA
DefWindowProcA
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegSetValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
OleInitialize
oleaut32
SysStringLen
LoadRegTypeLi
DispCallFunc
LoadTypeLi
RegisterTypeLi
SysAllocString
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
SysFreeString
msvcrt
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
_purecall
memcmp
time
atoi
strcpy
_mbsrchr
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
sprintf
strlen
_mbsstr
wcslen
_mbsicmp
__CxxFrameHandler
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
memset
realloc
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
shlwapi
PathFindFileNameA
wininet
InternetGetConnectedState
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gogouuc
setsys
setuuc
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ