winampGetMediaLibraryPlugin
Static task
static1
Behavioral task
behavioral1
Sample
414a4eefce2c886bdb3f6ba7acb6a6b4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
414a4eefce2c886bdb3f6ba7acb6a6b4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
414a4eefce2c886bdb3f6ba7acb6a6b4_JaffaCakes118
-
Size
216KB
-
MD5
414a4eefce2c886bdb3f6ba7acb6a6b4
-
SHA1
de6376fd16699beebe6971d2d7cc99739c095bcd
-
SHA256
18ebb2cee7f2607208c4964b7bea80bfbe4ac180f5bc159c13e5ed74be103b6b
-
SHA512
f41248e180c4b2cc108221c4a8b481ec786b422cb979bdb3491034f5cfb6782ad0b11718a14f30f9f78fec942b6848c3b6815a74b73082467e961ff9f994e777
-
SSDEEP
6144:aX8A3eRz2FAUTaX/AmNM8uXup74KxEWtEKR6qY9:aHR1T8/AH8QEEWtETX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 414a4eefce2c886bdb3f6ba7acb6a6b4_JaffaCakes118
Files
-
414a4eefce2c886bdb3f6ba7acb6a6b4_JaffaCakes118.dll windows:4 windows x86 arch:x86
944e879b22d376a6a9368bd141b90f28
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
comctl32
ord17
shlwapi
PathIsURLW
PathCombineA
kernel32
InterlockedExchange
FreeLibrary
CreateDirectoryA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
MultiByteToWideChar
GetShortPathNameW
lstrcmpW
WideCharToMultiByte
GetTimeFormatW
lstrlenW
GetDateFormatW
lstrcpynW
FindClose
FindFirstFileW
GetLastError
WaitForSingleObject
CreateThread
Sleep
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
DeleteFileW
ReadFile
SetFilePointer
CreateFileW
GetTempFileNameW
GetTempPathW
InterlockedIncrement
InterlockedDecrement
GetProcAddress
LocalAlloc
DisableThreadLibraryCalls
LoadLibraryA
CloseHandle
RaiseException
user32
SetTimer
KillTimer
InvalidateRect
GetSubMenu
EnableMenuItem
GetCursorPos
DestroyMenu
SetWindowLongA
SetCapture
GetAsyncKeyState
GetDlgItemTextA
SetDlgItemTextA
SetFocus
GetCapture
ReleaseCapture
ClientToScreen
GetWindowTextW
IsWindow
SetDlgItemTextW
PeekMessageA
GetParent
CharNextW
CharPrevW
GetDlgItemInt
SetDlgItemInt
CallWindowProcA
CheckDlgButton
PostMessageA
IsDlgButtonChecked
GetDlgItem
CallWindowProcW
MessageBoxA
SendMessageA
EnableWindow
SendMessageW
SetWindowLongW
DestroyWindow
IsWindowVisible
gdi32
DeleteObject
shell32
ShellExecuteW
oleaut32
SystemTimeToVariantTime
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
SysAllocString
nscrt
__CxxFrameHandler
_localtime64
_vsnwprintf
malloc
_strdup
_wcsicmp
_wcsnicmp
_wcsdup
__CppXcptFilter
_adjust_fdiv
_initterm
_onexit
__dllonexit
_purecall
_wtoi
_wfopen
fwprintf
fclose
fputws
fputwc
memcmp
memset
wcscpy
sprintf
strcmp
strlen
memcpy
time
??_U@YAPAXI@Z
??_V@YAXPAX@Z
realloc
wcslen
free
wcsstr
_except_handler3
??2@YAPAXI@Z
??3@YAXPAX@Z
_vsnprintf
wcscmp
Exports
Exports
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ