mcff.pdb
Static task
static1
Behavioral task
behavioral1
Sample
44e30cad7e5f5e7e5c5e6b17f19cee04_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44e30cad7e5f5e7e5c5e6b17f19cee04_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
44e30cad7e5f5e7e5c5e6b17f19cee04_JaffaCakes118
-
Size
546KB
-
MD5
44e30cad7e5f5e7e5c5e6b17f19cee04
-
SHA1
2262dd23608ba7b3444dba36b8bc081f160b4b03
-
SHA256
6782cb84779171bc6d06a6ead7602f04f8470d5f7e6a68c78c6511e2324a043b
-
SHA512
394c72256ac8e96211848c596f38d9dfb0d5d33241b716eac18e0d976d0b8544ff67ec6c6fc05ccc987cf808953cfcdbbf3388bea651e693b144b94b7a24be28
-
SSDEEP
12288:QJF5CqNXXw9XmFEkh5tcl1BRA5nbPFm7bk:QJFDVgrkFc37Yn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44e30cad7e5f5e7e5c5e6b17f19cee04_JaffaCakes118
Files
-
44e30cad7e5f5e7e5c5e6b17f19cee04_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
b2b48651c9d78137e6ef5f10c845ff21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InterlockedExchange
LockResource
FindResourceExW
FlushInstructionCache
GetCurrentProcess
GetCurrentProcessId
TerminateThread
SetEvent
GetCurrentThreadId
SetLastError
SetThreadPriority
GetThreadPriority
GetCurrentThread
CompareFileTime
GetFileTime
CreateEventW
ResetEvent
CopyFileW
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessW
Thread32Next
Thread32First
CreateToolhelp32Snapshot
DuplicateHandle
ReadProcessMemory
OpenThread
LoadLibraryW
GetSystemDirectoryW
InterlockedCompareExchange
GetEnvironmentVariableW
FatalAppExitA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
ExitProcess
GetModuleHandleA
GetCPInfo
LCMapStringW
LCMapStringA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineA
OpenProcess
TerminateProcess
GetProcAddress
InterlockedExchangeAdd
DeleteFileW
ReleaseMutex
CreateMutexW
WaitForSingleObject
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
lstrcmpiW
InterlockedDecrement
InterlockedIncrement
DisableThreadLibraryCalls
ExpandEnvironmentStringsW
FindFirstFileW
FindNextFileW
FindClose
GetFileSize
HeapAlloc
ReadFile
SetFilePointer
WriteFile
SetEndOfFile
CloseHandle
GetLastError
Sleep
CreateFileW
lstrcatW
GetProcessHeap
WideCharToMultiByte
HeapFree
GetVersionExW
GetComputerNameW
lstrlenW
LocalFree
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
CreateThread
ExitThread
RtlUnwind
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapSize
HeapReAlloc
HeapDestroy
EnterCriticalSection
RaiseException
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
SetConsoleCtrlHandler
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetVersionExA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
GetThreadLocale
GetLocaleInfoA
GetExitCodeThread
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
ReleaseSemaphore
UnmapViewOfFile
MapViewOfFile
GetTimeZoneInformation
SetFileAttributesW
GetTickCount
LocalAlloc
FileTimeToDosDateTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetLocalTime
GetFileInformationByHandle
GlobalAlloc
GlobalFree
lstrlenA
IsBadReadPtr
GlobalReAlloc
GlobalUnlock
GlobalLock
CreateSemaphoreW
lstrcpynW
lstrcpyW
CreateFileA
CreateFileMappingW
lstrcpyA
ProcessIdToSessionId
OpenFileMappingW
GetComputerNameExW
GetFileAttributesW
FindNextFileA
FindFirstFileA
lstrcpynA
GetSystemTime
GetSystemDefaultLangID
GetACP
CreateDirectoryW
GetTempPathW
RemoveDirectoryW
GetTempFileNameW
GetFileAttributesExW
CreateMutexA
Process32NextW
Process32FirstW
GlobalSize
SetFileTime
GetSystemTimeAsFileTime
HeapCreate
user32
IsWindow
ShowWindow
SetWindowLongW
EnumWindows
GetWindowThreadProcessId
GetParent
MessageBoxW
CharLowerW
CharLowerBuffW
UnregisterClassA
IsWindowVisible
CharNextW
PeekMessageW
LoadCursorW
DestroyWindow
SendMessageTimeoutW
DefWindowProcW
RegisterClassExW
CreateWindowExW
GetWindowLongW
CallWindowProcW
GetDesktopWindow
PostMessageW
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageW
GetClassInfoExW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
InitiateSystemShutdownExW
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
RevertToSelf
OpenThreadToken
ImpersonateLoggedOnUser
CryptEncrypt
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegEnumKeyW
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegGetKeySecurity
RegOpenKeyW
RegSetKeySecurity
RegEnumKeyExW
RegQueryValueExW
LookupAccountNameW
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExW
RegCloseKey
CryptDecrypt
CryptDeriveKey
LookupAccountSidW
SetTokenInformation
IsValidSid
SetNamedSecurityInfoW
ConvertStringSidToSidW
CryptDestroyKey
ole32
StringFromCLSID
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
GetHGlobalFromStream
CreateStreamOnHGlobal
oleaut32
VarI4FromStr
SysStringByteLen
SysAllocStringByteLen
VariantClear
VarBstrFromI4
VarUI4FromStr
SysFreeString
SysStringLen
SysAllocString
SysAllocStringLen
CreateErrorInfo
VarBstrCmp
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayRedim
VarBstrCat
VariantChangeType
SafeArrayDestroy
SafeArrayPutElement
SafeArrayGetElement
SystemTimeToVariantTime
SafeArrayCreateVector
SafeArrayCreate
GetErrorInfo
SetErrorInfo
VariantInit
shlwapi
PathFileExistsW
PathAppendW
PathStripPathW
SHCreateStreamOnFileW
PathSkipRootW
PathMatchSpecW
PathFindFileNameW
PathIsDirectoryW
PathIsDirectoryA
PathRemoveFileSpecA
PathFindFileNameA
PathAppendA
PathMatchSpecA
PathSkipRootA
PathRemoveFileSpecW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
wtsapi32
WTSCloseServer
WTSFreeMemory
WTSQuerySessionInformationW
WTSOpenServerW
netapi32
NetWkstaUserEnum
NetApiBufferFree
rpcrt4
UuidToStringW
UuidCreate
RpcStringFreeW
psapi
GetModuleFileNameExW
userenv
CreateEnvironmentBlock
shell32
SHGetFolderPathW
Exports
Exports
DisableDLP
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
EnableDLP
GetCurrentGroupID
GetDLPState
GetFireFoxMonitorState
GetLastUpdatedTimeStamp
Sections
.text Size: 416KB - Virtual size: 415KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFSHARE Size: 4KB - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ