d:\VSS_Source\VC\BackgroundOperation\Source\BackgroundOperation\output\BackgroundOperation.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6fbcb0dc3805bec0b047c7e1e02564da_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fbcb0dc3805bec0b047c7e1e02564da_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6fbcb0dc3805bec0b047c7e1e02564da_JaffaCakes118
-
Size
308KB
-
MD5
6fbcb0dc3805bec0b047c7e1e02564da
-
SHA1
5d161d896a5c1e0172ca87801c051cd7ed848d16
-
SHA256
d1173729a4e084c688a714d50f95a32085c08712500726ded8f1d82bd984f6b4
-
SHA512
d0f8c424bcf1ff788620bb17149a694eb20aa124020149d35e85b14be46fcec71e0f6f9e3adf6861fab547f9ba4acb60e9e26f3b545f1fe8022699297062a67e
-
SSDEEP
3072:EjncLqmDx15cXxiKvPOwuccquExGjM8K1tYH/SIyZLf4mp1DjRD2tZJAY5qOdi:EjncLqmDWXxrZuZE6KZbt1a7Qqi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fbcb0dc3805bec0b047c7e1e02564da_JaffaCakes118
Files
-
6fbcb0dc3805bec0b047c7e1e02564da_JaffaCakes118.dll windows:4 windows x86 arch:x86
3dbf0dcfcd74cc58e7facd7ed89d3150
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
iphlpapi
GetAdaptersInfo
kernel32
lstrcpyW
CreateProcessW
FindFirstFileW
FindNextFileW
FindClose
Sleep
SetLastError
CreateMutexW
GetWindowsDirectoryW
EnterCriticalSection
LeaveCriticalSection
lstrlenW
GetLocalTime
CreateFileW
SetFilePointer
WriteFile
WideCharToMultiByte
CreateFileA
DeviceIoControl
SystemTimeToFileTime
WriteProcessMemory
GetCurrentProcess
GlobalAlloc
GetModuleHandleW
GetTickCount
lstrcmpW
GlobalLock
GlobalUnlock
FlushInstructionCache
MulDiv
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
ResumeThread
GetThreadContext
SetThreadContext
SuspendThread
CompareStringW
CompareStringA
FlushFileBuffers
GetTempFileNameW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
RtlUnwind
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetModuleFileNameA
GetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCommandLineA
GetSystemTimeAsFileTime
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
GetTempPathW
GetPrivateProfileStringW
GetPrivateProfileIntW
CreateThread
CreateEventW
GetCurrentProcessId
SetEvent
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSection
GetLastError
FindResourceExW
LoadResource
MultiByteToWideChar
LockResource
SizeofResource
InterlockedDecrement
FindResourceW
InterlockedIncrement
RaiseException
WaitForSingleObject
CloseHandle
GetCurrentThread
GetProcAddress
LoadLibraryW
ReadFile
GetCurrentThreadId
FreeLibrary
SetEnvironmentVariableA
WriteConsoleW
user32
PeekMessageW
DispatchMessageW
GetMessageW
ShowWindow
CreateDialogParamW
DefWindowProcW
GetWindowThreadProcessId
FindWindowW
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
SendMessageW
PostThreadMessageW
RegisterWindowMessageW
CreateWindowExW
CallWindowProcW
FillRect
GetWindowTextLengthW
MoveWindow
GetDlgItem
GetWindowTextW
RegisterClassExW
InvalidateRect
InvalidateRgn
GetWindow
SetFocus
GetClassInfoExW
CreateAcceleratorTableW
GetFocus
RedrawWindow
IsChild
DestroyAcceleratorTable
TranslateMessage
SetTimer
UnregisterClassA
KillTimer
GetDesktopWindow
GetClientRect
SetWindowPos
SetWindowTextW
GetWindowLongW
SetWindowLongW
SetWindowPlacement
BeginPaint
EndPaint
DestroyWindow
EnumChildWindows
IsWindow
GetParent
ClientToScreen
GetDC
SetCapture
GetSysColor
ReleaseCapture
ReleaseDC
CharNextW
LoadCursorW
InflateRect
SetRect
PtInRect
GetCursorPos
VkKeyScanW
PostMessageW
GetClassNameW
ScreenToClient
OffsetRect
gdi32
GetObjectW
GetStockObject
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
BitBlt
GetDeviceCaps
SelectObject
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegDeleteValueW
RegCloseKey
RegQueryInfoKeyW
RegEnumValueW
shell32
SHGetPathFromIDListW
SHGetFolderLocation
ole32
CoTaskMemAlloc
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleLockRunning
StringFromCLSID
CoGetClassObject
CoUninitialize
OleInitialize
StringFromGUID2
CreateStreamOnHGlobal
CoTaskMemFree
CoInitialize
oleaut32
SysStringLen
VariantCopy
SysFreeString
VariantClear
VariantInit
SysAllocStringLen
SysAllocString
SafeArrayAccessData
SafeArrayUnaccessData
OleCreateFontIndirect
DispCallFunc
LoadTypeLi
SafeArrayGetUBound
LoadRegTypeLi
SafeArrayGetLBound
SysStringByteLen
shlwapi
PathFindOnPathW
PathFileExistsW
PathIsRelativeW
PathFindExtensionW
StrStrIW
UrlCanonicalizeW
urlmon
CoInternetGetSession
URLDownloadToCacheFileW
URLDownloadToFileW
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
FindCloseUrlCache
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
InternetCrackUrlW
InternetCanonicalizeUrlW
Exports
Exports
SendStatisticDataOnInstall
UpdateIFEOInfo
fnClose
fnOpen
Sections
.text Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ