e:\JinZQ\Hook开机启动\CallWebDllLib\Release\CallDll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d46fd81b1a10df803c90657ff559a85_JaffaCakes118
-
Size
412KB
-
MD5
5d46fd81b1a10df803c90657ff559a85
-
SHA1
bce9acf7fa4c0ec002a5e65c0faf9ccaf3253ccd
-
SHA256
5b6071e6ef76a90ea0926e8fca14b36a110c9b6a1cf8c6b19d074ce01f47fe28
-
SHA512
b2b5a361d72dea77f8a77d8adfa4f959d8c0597c9cd50d0557b26121efc1fbd8075549af3ea644df0b6b8bcaa226d1bf320ea5d11f462f8c9e60d80301a96753
-
SSDEEP
6144:gSx15x6uh/YSqD3LzGONaB3WLsW3NVhxMEmW5WvRUN2/k+4jML+GbSzIV15:/nh/YTzfGONWQb3ZxMEZ5Wv2ek+4M7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d46fd81b1a10df803c90657ff559a85_JaffaCakes118
Files
-
5d46fd81b1a10df803c90657ff559a85_JaffaCakes118.exe windows:4 windows x86 arch:x86
350ee33c18a858a05d1a6d00eec4d5c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetFullPathNameA
CreateFileA
GetCPInfo
GetOEMCP
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetStartupInfoA
GetCommandLineA
HeapSize
GetVolumeInformationA
GetCurrentProcessId
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
SetLastError
FormatMessageA
GlobalFree
FreeResource
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
GlobalAddAtomA
GetCurrentThread
GlobalDeleteAtom
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LocalFree
LoadLibraryA
GetCurrentThreadId
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FreeLibrary
GetModuleHandleA
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
GetCurrentProcess
FlushInstructionCache
MulDiv
InterlockedDecrement
InterlockedIncrement
GetWindowsDirectoryA
GetProcessId
Thread32First
Thread32Next
MoveFileExA
GetProcessHeap
HeapFree
WritePrivateProfileStringA
GetTickCount
OutputDebugStringW
CompareStringW
CompareStringA
OpenProcess
GetPriorityClass
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
LeaveCriticalSection
EnterCriticalSection
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
FindResourceExA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
MultiByteToWideChar
CreateThread
CloseHandle
GetPrivateProfileStringA
CreateDirectoryA
GetModuleFileNameA
CreateProcessA
Sleep
CopyFileA
DeleteFileA
MoveFileA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
CreateMutexA
GetLastError
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
QueryPerformanceCounter
user32
MessageBeep
GetNextDlgGroupItem
CopyAcceleratorTableA
SetRect
IsRectEmpty
GetSysColorBrush
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
MoveWindow
IsDialogMessageA
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
SendDlgItemMessageA
SetActiveWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
EqualRect
GetClassInfoA
SetWindowPlacement
GetDlgCtrlID
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
GetLastActivePopup
IsWindowEnabled
PostThreadMessageA
SetCursor
PostMessageA
SetTimer
PeekMessageA
GetWindowThreadProcessId
MessageBoxA
RegisterClassA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
RegisterWindowMessageA
GetWindowTextLengthA
SetWindowTextA
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
SetWindowPos
DestroyWindow
RedrawWindow
GetDlgItem
SetFocus
GetFocus
RegisterClipboardFormatA
IsChild
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
FillRect
AdjustWindowRectEx
SetCapture
ReleaseCapture
GetSysColor
DefWindowProcA
CreateWindowExA
SetWindowLongA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetWindowLongA
GetForegroundWindow
GetWindowTextA
GetWindowRect
IsWindow
UnregisterClassA
CharUpperA
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
OffsetRect
RemovePropA
gdi32
GetViewportExtEx
CreateRectRgnIndirect
GetRgnBox
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutA
RectVisible
PtVisible
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetTextColor
GetBkColor
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
GetWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
RegQueryValueA
RegOpenKeyA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathFileExistsA
PathIsUNCA
oledlg
ord8
ole32
OleUninitialize
OleInitialize
CoTaskMemRealloc
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoInitialize
CoCreateInstance
CoTaskMemFree
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CLSIDFromString
CoRevokeClassObject
oleaut32
SysAllocStringLen
VariantInit
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringByteLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysAllocString
VariantChangeType
VariantCopy
VariantClear
SysFreeString
psapi
GetModuleFileNameExA
ws2_32
closesocket
WSAStartup
Exports
Exports
?EngineProc@@YGJHIJ@Z
?pro_cess1@@YAHHHHPAD@Z
?pro_cess2@@YAHXZ
?pro_cess3@@YAHH@Z
?pro_cess5@@YAHH@Z
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dfsaewr4 Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ