e:\adqwdwqd\123railgari\Release\DBInfo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6f5516b12bcffc9307f7453e5598553b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f5516b12bcffc9307f7453e5598553b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6f5516b12bcffc9307f7453e5598553b_JaffaCakes118
-
Size
3.4MB
-
MD5
6f5516b12bcffc9307f7453e5598553b
-
SHA1
ea103c7bdc67c40a7c1ed609325263e5478a440c
-
SHA256
e7e0df40c31195b32d01aacd0a66a08b364c533c4c086ab5e1bf59f0c54fb0f7
-
SHA512
857247e42bc92aec76c58b55f6d670e3a879096562b212dd729249952d60d2ace47be5e96f687c979c70fdb55558e11c879143b35ea2816ef6e46d294462a832
-
SSDEEP
49152:eVFhTHO/a8Aj+DJDjhZkXqdT+/Vbd+enagpC7El:eNT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f5516b12bcffc9307f7453e5598553b_JaffaCakes118
Files
-
6f5516b12bcffc9307f7453e5598553b_JaffaCakes118.dll windows:4 windows x86 arch:x86
e47ec7df558f866dfac835fc91e3e80e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
wininet
InternetGetConnectedState
InternetCloseHandle
InternetConnectA
InternetOpenA
HttpOpenRequestA
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpSendRequestA
HttpQueryInfoA
FtpOpenFileA
InternetReadFile
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
psapi
GetModuleBaseNameA
GetModuleFileNameExA
EnumProcesses
EnumProcessModules
kernel32
LockFile
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GetShortPathNameA
GetModuleFileNameW
InterlockedDecrement
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
SetErrorMode
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
FreeResource
InterlockedIncrement
GlobalFlags
GetAtomNameA
SystemTimeToFileTime
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCurrentDirectoryA
LocalFileTimeToFileTime
FlushFileBuffers
SetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
GetSystemTimeAsFileTime
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetDriveTypeA
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetProcessHeap
ExitProcess
SetStdHandle
GetFileType
HeapSize
FatalAppExitA
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetCurrentDirectoryA
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
SetConsoleCtrlHandler
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetFilePointer
ReadFile
MoveFileA
GlobalAddAtomA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalDeleteAtom
GetCurrentProcessId
lstrcmpA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
GlobalFree
CopyFileA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
SetLastError
GetCurrentThreadId
DeviceIoControl
GlobalMemoryStatus
GetComputerNameA
GetVersionExA
GetSystemInfo
CreateDirectoryA
RemoveDirectoryA
GetCurrentProcess
GetFileAttributesA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateThread
WaitForMultipleObjects
CreateEventA
WaitForSingleObject
SetEvent
ResetEvent
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
TerminateThread
ResumeThread
SuspendThread
SetThreadPriority
GetThreadPriority
ExitThread
OpenProcess
GetExitCodeProcess
TerminateProcess
GetModuleHandleA
GetModuleFileNameA
ExpandEnvironmentStringsA
FindFirstFileA
FindClose
QueryPerformanceCounter
QueryPerformanceFrequency
MoveFileExA
GetTempPathA
GetTempFileNameA
DeleteFileA
CreateFileA
WriteFile
CloseHandle
Sleep
GetStringTypeExW
GetStringTypeExA
GetEnvironmentVariableW
GetEnvironmentVariableA
lstrlenA
lstrcmpiW
lstrcmpiA
CompareStringW
CompareStringA
lstrlenW
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
SetFileTime
user32
DeleteMenu
GetDesktopWindow
ClientToScreen
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
ScrollWindowEx
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
GetSysColor
AdjustWindowRectEx
ScreenToClient
GrayStringA
DeferWindowPos
CopyRect
GetScrollInfo
SetScrollInfo
PtInRect
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
UnregisterClassA
UnhookWindowsHookEx
GetSystemMetrics
SetCursor
PostQuitMessage
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuStringA
AppendMenuA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetDialogBaseUnits
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
DestroyMenu
GetMenuItemInfoA
InflateRect
DestroyIcon
EndPaint
BeginPaint
RegisterClassA
GetWindowDC
GetCursorPos
ValidateRect
wsprintfA
CharUpperW
CharUpperA
CharLowerW
CharLowerA
PostMessageA
DrawTextExA
DrawTextA
TabbedTextOutA
EqualRect
FillRect
ShowOwnedPopups
gdi32
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
PolyDraw
PolylineTo
PolyBezierTo
ExtSelectClipRgn
DeleteDC
CreateDIBPatternBrushPt
CreatePatternBrush
CreateCompatibleDC
GetStockObject
SelectPalette
PlayMetaFileRecord
Escape
EnumMetaFile
PlayMetaFile
CreatePen
ExtCreatePen
CreateSolidBrush
CreateHatchBrush
CreateFontIndirectA
GetTextExtentPoint32A
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
PatBlt
DPtoLP
GetTextMetricsA
BitBlt
GetWindowExtEx
GetViewportExtEx
SelectClipPath
CreateRectRgn
GetClipRgn
SelectClipRgn
ExtTextOutA
TextOutA
RectVisible
PtVisible
StartDocA
OffsetClipRgn
IntersectClipRect
ExcludeClipRect
SetMapMode
ModifyWorldTransform
SetWorldTransform
SetGraphicsMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
CreateBitmap
CreateDCA
CopyMetaFileA
GetObjectType
GetDeviceCaps
SetColorAdjustment
SetArcDirection
SetMapperFlags
SetTextCharacterExtra
SetTextJustification
SetTextAlign
MoveToEx
LineTo
GetPixel
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegQueryValueA
RegSetValueA
RegEnumKeyA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
CryptDecrypt
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptEncrypt
CryptDestroyKey
CryptReleaseContext
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegSetValueExA
RegOpenKeyA
RegDeleteKeyA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegCreateKeyA
shell32
ShellExecuteA
SHGetFolderPathA
SHGetFileInfoA
ExtractIconA
SHFileOperationA
shlwapi
PathRemoveExtensionA
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
SetConvertStg
WriteFmtUserTypeStg
WriteClassStg
OleRegGetUserType
ReadFmtUserTypeStg
ReadClassStg
StringFromCLSID
CoTreatAsClass
CreateBindCtx
ReleaseStgMedium
CLSIDFromString
StringFromGUID2
CoDisconnectObject
OleDuplicateData
CoTaskMemAlloc
oleaut32
VariantCopy
VarDateFromStr
SafeArrayRedim
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayCopy
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
SysReAllocStringLen
VarBstrFromCy
VarBstrFromDec
VarDecFromStr
VarCyFromStr
VarBstrFromDate
Exports
Exports
wefwefwesdvsdv
wfdwefewfwef
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ