e:\LocalSvnForDailyBuild\babyfoot\trunk\Bin\Release\ScriptMessage.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3fdb5979b80adedf3de8197a0f2665b4_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3fdb5979b80adedf3de8197a0f2665b4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3fdb5979b80adedf3de8197a0f2665b4_JaffaCakes118
-
Size
428KB
-
MD5
3fdb5979b80adedf3de8197a0f2665b4
-
SHA1
b7e3f1bf1825ca573b6dc52bccf238bf36dc4b84
-
SHA256
17034d478aaa5b5605ed0425dbbd7a4d3ed5b6d28f0faee4ccb4fd3dacb1b7be
-
SHA512
d90590e1332a33c02330166aaa565b8fbf3b9e1d5e628bc707e23693cfbc758defde33febf1ebf5b3e0be245c340e07110775538fc85181fbe865dd4bc639e2a
-
SSDEEP
6144:gTiBJXoNuTZkhaRK553iZC3f+DqgI89U4dcT8SYSoUfnbrve:gTiBaNu+3mDTylTLPG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fdb5979b80adedf3de8197a0f2665b4_JaffaCakes118
Files
-
3fdb5979b80adedf3de8197a0f2665b4_JaffaCakes118.dll windows:4 windows x86 arch:x86
470d0c1c6a9c6f1e3d834807c441fa6f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapReAlloc
HeapAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
RtlUnwind
RaiseException
WriteConsoleW
GetFileType
GetStdHandle
ExitProcess
HeapSize
Sleep
HeapDestroy
HeapCreate
VirtualFree
GetACP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
LoadLibraryW
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetOEMCP
GetCPInfo
CreateFileA
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
GetThreadLocale
InterlockedIncrement
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
FreeResource
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalAddAtomA
CloseHandle
InterlockedDecrement
GetModuleFileNameW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
SetLastError
GlobalFree
FormatMessageA
LocalFree
MulDiv
GetTickCount
WritePrivateProfileStringA
GetModuleFileNameA
GetLastError
GetVersion
MultiByteToWideChar
lstrlenA
CompareStringA
CreateFileW
InterlockedExchange
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GlobalUnlock
GlobalLock
GlobalAlloc
user32
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
GetCursorPos
ValidateRect
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetWindow
UnhookWindowsHookEx
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
SetCursor
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
GetMenuState
GetMenuItemID
IsWindowVisible
EndPaint
BeginPaint
GetMenuItemCount
GetSubMenu
LoadIconA
EnableWindow
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
SendMessageA
DestroyMenu
GetWindowTextLengthA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetSysColorBrush
UnregisterClassA
ReleaseDC
GetDC
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
SetActiveWindow
PeekMessageA
gdi32
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SetWindowExtEx
GetDeviceCaps
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shell32
SHFileOperationA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantInit
VariantChangeType
VariantClear
Exports
Exports
GetPlugin
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ