d:\work\KaoLa_VSS_Source\BackgroundOperation\Source\BackgroundOperation\output\BackgroundOperation.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6aa40f7d1bd2f4fb8e8222f0afeb4ed2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6aa40f7d1bd2f4fb8e8222f0afeb4ed2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6aa40f7d1bd2f4fb8e8222f0afeb4ed2_JaffaCakes118
-
Size
312KB
-
MD5
6aa40f7d1bd2f4fb8e8222f0afeb4ed2
-
SHA1
c23554d8b3f3284632cb25f9867d51d2b706d8d0
-
SHA256
1f07fb02c0fcf07b8efb8779120f198ea199067c9d84e6aaaa5ee40eb35b9ea7
-
SHA512
92d9135029b98af536e4c49e43917583075f78d152e7825c6e616df9f58d6c40582df057f48db71fbebad972e732e0b78034b94b8f7f080824a305f094c229a4
-
SSDEEP
3072:GY7N2kteqO0kFoTZDru8c4Bq3LdUlrhG5ZE0+ryTFPld4uTOWUyF5E7jMUFta95H:H7pzrTY/xUlEWKrmXSTn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6aa40f7d1bd2f4fb8e8222f0afeb4ed2_JaffaCakes118
Files
-
6aa40f7d1bd2f4fb8e8222f0afeb4ed2_JaffaCakes118.dll windows:4 windows x86 arch:x86
d5557471266b95c6e8e9e72695743999
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
iphlpapi
GetAdaptersInfo
kernel32
RaiseException
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
InterlockedIncrement
InterlockedDecrement
Sleep
GetPrivateProfileIntW
GetPrivateProfileStringW
GetTempPathW
GetTempFileNameW
lstrcpyW
CreateProcessW
SetLastError
CreateMutexW
GetWindowsDirectoryW
FindFirstFileW
FindNextFileW
FindClose
EnterCriticalSection
LeaveCriticalSection
lstrlenW
GetLocalTime
CreateFileW
SetFilePointer
WriteFile
WideCharToMultiByte
CreateFileA
SystemTimeToFileTime
DeviceIoControl
WriteProcessMemory
GetCurrentProcess
GlobalAlloc
GetModuleHandleW
GetTickCount
GlobalLock
GlobalUnlock
FlushInstructionCache
MulDiv
lstrcmpW
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
ResumeThread
GetThreadContext
SetThreadContext
SuspendThread
CompareStringW
CompareStringA
WaitForSingleObject
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
RtlUnwind
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetModuleFileNameA
GetStdHandle
GetOEMCP
GetCPInfo
HeapCreate
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCommandLineA
GetSystemTimeAsFileTime
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
CloseHandle
CreateThread
CreateEventW
SetEvent
GetLastError
MultiByteToWideChar
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameW
GetCurrentThreadId
FreeLibrary
GetCurrentThread
GetProcAddress
LoadLibraryW
SetEnvironmentVariableA
ReadFile
FlushFileBuffers
user32
PostThreadMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
ShowWindow
CreateDialogParamW
DefWindowProcW
GetWindowThreadProcessId
FindWindowW
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
SendMessageW
RegisterWindowMessageW
CreateWindowExW
CallWindowProcW
GetDlgItem
GetWindow
SetFocus
GetFocus
IsChild
RedrawWindow
DestroyAcceleratorTable
CharNextW
GetSysColor
CreateAcceleratorTableW
MoveWindow
ReleaseCapture
SetCapture
FillRect
InvalidateRect
InvalidateRgn
ReleaseDC
GetDC
GetMessageW
UnregisterClassA
SetTimer
KillTimer
GetDesktopWindow
GetClientRect
GetWindowRect
SetWindowPos
SetWindowTextW
GetWindowLongW
SetWindowLongW
SetWindowPlacement
BeginPaint
EndPaint
DestroyWindow
ScreenToClient
IsWindow
GetParent
OffsetRect
GetClassInfoExW
RegisterClassExW
GetWindowTextW
GetWindowTextLengthW
LoadCursorW
GetSystemMetrics
VkKeyScanW
PostMessageW
InflateRect
SetRect
PtInRect
GetCursorPos
ClientToScreen
EnumChildWindows
GetClassNameW
gdi32
GetStockObject
GetObjectW
GetDeviceCaps
BitBlt
DeleteDC
CreateCompatibleDC
SelectObject
DeleteObject
CreateCompatibleBitmap
CreateSolidBrush
advapi32
RegCreateKeyExW
RegQueryValueExW
RegEnumValueW
RegQueryInfoKeyW
RegCloseKey
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
shell32
SHGetPathFromIDListW
SHGetFolderLocation
ole32
OleUninitialize
CoUninitialize
CoTaskMemAlloc
StringFromGUID2
OleLockRunning
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoCreateInstance
OleInitialize
StringFromCLSID
CreateStreamOnHGlobal
CoTaskMemFree
CoInitialize
oleaut32
VariantInit
SysFreeString
VariantCopy
VariantClear
SysAllocString
SafeArrayAccessData
SafeArrayUnaccessData
SysStringLen
SysAllocStringLen
DispCallFunc
OleCreateFontIndirect
LoadTypeLi
LoadRegTypeLi
SysStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
shlwapi
PathIsRelativeW
PathFindFileNameW
PathFindOnPathW
PathFileExistsW
PathFindExtensionW
StrStrIW
UrlCanonicalizeW
urlmon
CoInternetGetSession
URLDownloadToFileW
URLDownloadToCacheFileW
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
FindCloseUrlCache
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
InternetCrackUrlW
InternetCanonicalizeUrlW
Exports
Exports
JunkFunction
JunkFunction2
SendStatisticDataOnInstall
UpdateIFEOInfo
fnClose
fnOpen
Sections
.text Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ