shgina.pdb
Static task
static1
Behavioral task
behavioral1
Sample
60e802ed3f5ed0ee84c4c2cc5eda38da_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
60e802ed3f5ed0ee84c4c2cc5eda38da_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
60e802ed3f5ed0ee84c4c2cc5eda38da_JaffaCakes118
-
Size
121KB
-
MD5
60e802ed3f5ed0ee84c4c2cc5eda38da
-
SHA1
db1963746c18c5ab5ee6d1c41eebefa40f6ceca9
-
SHA256
085cb78bcab323930eb5b0a70d2b896bbfbc54d91786f19abf3db73d4c83b9b3
-
SHA512
9bbcd679c92cac0fa4c33b517ec6f607520530f75a52ac5ab4ed605b63c76032f5c1ef627c1c9644f9eb401a5d8c6cc485cbe6d6f5b846c617ac6d07fe87001d
-
SSDEEP
3072:OOUHvT36Rpgsa4THC0+lrw71ldCQ7Sp6L35642iM:4HvT6MsFHGlM7FCsSp+5647
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60e802ed3f5ed0ee84c4c2cc5eda38da_JaffaCakes118
Files
-
60e802ed3f5ed0ee84c4c2cc5eda38da_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
147642491184388948174cb8224615e9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_vsnwprintf
free
_initterm
_adjust_fdiv
malloc
wcslen
_except_handler3
ntdll
NtClose
RtlGetLastNtStatus
RtlAdjustPrivilege
RtlNtStatusToDosError
NtOpenFile
RtlInitUnicodeStringEx
RtlRunEncodeUnicodeString
NtQueryInformationProcess
RtlRunDecodeUnicodeString
NtCreateEvent
NtOpenEvent
NtCreateSection
NtQueryInformationFile
kernel32
SetEvent
ReleaseMutex
OpenMutexW
GetCurrentThreadId
SystemTimeToFileTime
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
CreateEventW
GetProcAddress
LoadLibraryA
GetCurrentThread
lstrcpyW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
SetProcessWorkingSetSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
OpenProcess
QueueUserAPC
WaitForSingleObject
GetModuleHandleExW
CreateThread
FreeLibrary
FreeLibraryAndExitThread
lstrcatW
IsBadStringPtrW
ExpandEnvironmentStringsW
IsBadWritePtr
GetCurrentProcessId
DelayLoadFailureHook
ExitProcess
TerminateProcess
CompareFileTime
InterlockedCompareExchange
GetComputerNameW
CloseHandle
lstrlenW
FindFirstFileExW
FindNextFileW
FindClose
RemoveDirectoryW
lstrcmpiW
InterlockedExchange
GlobalMemoryStatusEx
Sleep
GetSystemDirectoryW
GetFileAttributesW
SetFileAttributesW
GetCurrentProcess
DeleteFileW
SetLastError
GetModuleFileNameW
GetLastError
GetModuleFileNameA
DisableThreadLibraryCalls
InterlockedDecrement
InterlockedIncrement
LocalFree
LocalAlloc
OpenEventW
SleepEx
WaitForSingleObjectEx
CompareStringW
MoveFileExW
LocalSize
GetLocalTime
user32
LoadStringW
ExitWindowsEx
GetSystemMetrics
PostMessageW
FindWindowW
SendMessageTimeoutW
SendMessageW
UnregisterClassW
DestroyWindow
SetWindowLongW
DefWindowProcW
GetWindowLongW
CreateWindowExW
RegisterClassExW
advapi32
GetUserNameW
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
OpenThreadToken
OpenProcessToken
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
LsaAddAccountRights
LsaRemoveAccountRights
LsaNtStatusToWinError
LsaEnumerateAccountRights
EqualSid
GetSidSubAuthorityCount
GetSidLengthRequired
GetSidIdentifierAuthority
InitializeSid
GetSidSubAuthority
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
LookupAccountSidW
LookupAccountNameW
ConvertSidToStringSidW
LsaStorePrivateData
LogonUserW
GetSecurityDescriptorOwner
TreeResetNamedSecurityInfoW
SetKernelObjectSecurity
RegUnLoadKeyW
RegLoadKeyW
LsaOpenPolicy
LsaQueryInformationPolicy
LsaFreeMemory
LsaClose
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorDacl
SetNamedSecurityInfoW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
netapi32
DsGetDcNameW
NetUserGetInfo
NetLocalGroupAddMembers
NetUserAdd
NetUserChangePassword
NetUserModalsGet
NetUserGetLocalGroups
NetLocalGroupDelMembers
NetUserDel
NetApiBufferFree
NetUserSetInfo
oleaut32
SetErrorInfo
SysFreeString
SysAllocString
LoadRegTypeLi
LoadTypeLi
RegisterTypeLi
VariantChangeType
SysAllocStringLen
comctl32
ord358
ord336
ord328
ord334
ord386
ord333
shlwapi
ord219
PathCommonPrefixW
ord437
StrCmpW
PathCombineW
PathIsFileSpecW
PathFindFileNameW
SHGetValueW
SHDeleteValueW
PathFindExtensionW
PathRemoveFileSpecW
StrCmpIW
PathCreateFromUrlW
PathIsURLW
PathAppendW
SHDeleteKeyW
ord24
PathRemoveBackslashW
shell32
ord236
ord233
SHEnumerateUnreadMailAccountsW
SHGetUnreadMailCountW
SHChangeNotify
ord680
ord100
ord234
SHCreateDirectoryExW
ord171
SHFileOperationW
rpcrt4
RpcEpResolveBinding
RpcBindingFromStringBindingW
NdrClientCall2
RpcStringBindingComposeW
RpcStringFreeW
RpcBindingFree
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ