d:\Work\.Current\Freecause\Trunk\SVN.Trunk\package\msgboxplugin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4c2a1740470643df3e8e07d9d475061e_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c2a1740470643df3e8e07d9d475061e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4c2a1740470643df3e8e07d9d475061e_JaffaCakes118
-
Size
385KB
-
MD5
4c2a1740470643df3e8e07d9d475061e
-
SHA1
08d9b34bce7f897d9a59e5403f9cb7360c18588c
-
SHA256
f9a2ccd63137b2609f2b1836b9d2484a4cad824cd7ca3c785f29075d491ddb41
-
SHA512
d3273b4220b4c5643c5eab0c25d13467a663c683f962ace5cf7963f840a2e2777c87eed5a34a8ecbcb470a534d8c128267165035f471d04efae5e61fd453af12
-
SSDEEP
12288:xJAdy8J8MSMpsS/rFYAIdmE4Ekqclf/k:QdyvMGS/rFYAcn/olf/k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c2a1740470643df3e8e07d9d475061e_JaffaCakes118
Files
-
4c2a1740470643df3e8e07d9d475061e_JaffaCakes118.dll windows:5 windows x86 arch:x86
f5bf42725c49d4c113e19d01bba98d36
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GlobalLock
GlobalAlloc
MulDiv
lstrcmpW
FreeLibrary
GetModuleHandleW
lstrcmpiW
LoadLibraryExW
WaitForSingleObject
CreateEventW
CloseHandle
CreateThread
SetThreadPriority
ResumeThread
SetEvent
CreateDirectoryW
CopyFileW
TerminateThread
ResetEvent
GetCurrentProcessId
GetFullPathNameW
GetFileSize
FindFirstFileW
WriteFile
Sleep
ReadFile
CreateFileW
FindClose
FindNextFileW
GetFileAttributesExW
lstrcpyW
lstrlenA
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GlobalUnlock
GetStringTypeW
GetStringTypeA
LCMapStringA
GetConsoleMode
GetConsoleCP
GetProcAddress
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetTimeZoneInformation
GetModuleHandleA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
ExitProcess
GetModuleFileNameA
GetStdHandle
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
GetCommandLineA
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FlushInstructionCache
GetCurrentProcess
SetLastError
RaiseException
GetCurrentThreadId
GetLastError
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryW
GetModuleFileNameW
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
FindResourceExW
EnterCriticalSection
FindResourceW
LoadResource
LockResource
TerminateProcess
GlobalAddAtomA
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
SizeofResource
InterlockedDecrement
LeaveCriticalSection
SetFilePointer
VirtualQuery
user32
EndPaint
FindWindowW
UnregisterClassA
KillTimer
PostMessageW
SetTimer
RegisterClassExW
LoadCursorW
DefWindowProcW
SetWindowLongW
GetWindowLongW
DestroyAcceleratorTable
GetDesktopWindow
ReleaseDC
GetDC
InvalidateRect
CallWindowProcW
InvalidateRgn
GetClientRect
FillRect
ReleaseCapture
SetCapture
MoveWindow
ScreenToClient
GetParent
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
PostThreadMessageW
SetForegroundWindow
ShowWindow
ClientToScreen
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
MapWindowPoints
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
BeginPaint
DestroyIcon
IsChild
GetFocus
SetFocus
GetWindow
GetDlgItem
SendMessageW
IsWindow
GetClassNameW
GetSysColor
CharNextW
SetWindowPos
RedrawWindow
GetClassInfoExW
CreateWindowExW
DestroyWindow
CreateAcceleratorTableW
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
BitBlt
DeleteDC
GetStockObject
GetObjectW
GetDeviceCaps
CreateSolidBrush
advapi32
RegSetValueExW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
ole32
CoTaskMemRealloc
CoTaskMemFree
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoCreateInstance
CreateStreamOnHGlobal
OleLockRunning
StringFromGUID2
CoTaskMemAlloc
OleUninitialize
CoInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocString
VariantChangeType
OleCreateFontIndirect
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocStringLen
DispCallFunc
VarUI4FromStr
VarBstrCmp
VariantInit
SysFreeString
VariantCopy
shlwapi
PathAppendW
PathRemoveFileSpecW
comctl32
ImageList_GetIcon
ImageList_Destroy
ImageList_LoadImageW
wininet
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetQueryOptionW
InternetSetOptionW
HttpAddRequestHeadersA
HttpSendRequestW
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
Exports
Exports
IsUnicode
PlugCreate
PlugInit
PlugInvoke
PlugTerm
Sections
.text Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ