d:\My Projects\wjxtdAutoPro\release\wjxtdAutoPro.pdb
Static task
static1
Behavioral task
behavioral1
Sample
762bc735bb9f2c7444fdf3d7f40c595c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
762bc735bb9f2c7444fdf3d7f40c595c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
762bc735bb9f2c7444fdf3d7f40c595c_JaffaCakes118
-
Size
392KB
-
MD5
762bc735bb9f2c7444fdf3d7f40c595c
-
SHA1
a50a9aa98f0d5e41a0c43e6faed162645d5d4f15
-
SHA256
5b2688a37114670ddb97a12a23e41ec87d203475e7d8b134b086ab5df90933c9
-
SHA512
6d1c3a686b2f671d927438222dd2b5412df37b3756963a1d8f82fcdf212222c30a541351753464f9ef250599d0788a7ec8dd96a42223c1ade586c74c6a123ce7
-
SSDEEP
6144:B+8SfCCUhQ5hPVZIv7DG0MXu11iZyX/L6HZDaL9BOTZ+:8SDch/Qa0r1iML6HFaL9BT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 762bc735bb9f2c7444fdf3d7f40c595c_JaffaCakes118
Files
-
762bc735bb9f2c7444fdf3d7f40c595c_JaffaCakes118.dll windows:4 windows x86 arch:x86
48fe82b4b2385dd96ddf1f02b128d50e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentThread
WideCharToMultiByte
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetLastError
SetLastError
lstrcmpiA
GetModuleFileNameA
CompareStringA
ResumeThread
GetThreadContext
SetThreadContext
VirtualQuery
GetCurrentProcess
InterlockedCompareExchange
FlushInstructionCache
VirtualAlloc
VirtualProtect
GetCurrentThreadId
SuspendThread
SetFilePointer
WriteFile
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleHandleA
DisableThreadLibraryCalls
FindResourceA
LoadResource
FindResourceExA
SizeofResource
LockResource
lstrcmpA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsFree
GetThreadLocale
SetEnvironmentVariableA
SetEndOfFile
CreateFileW
CreateFileA
GetLocaleInfoW
TlsSetValue
ReadFile
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetVersionExA
GetProcessHeap
GetCPInfo
RtlUnwind
RaiseException
ExitProcess
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
TlsGetValue
TlsAlloc
user32
UnregisterClassA
GetKeyState
ShowWindow
CharNextA
CallNextHookEx
SendMessageA
RegisterWindowMessageA
SetWindowLongA
IsWindowUnicode
SetWindowLongW
SetWindowsHookExA
IsWindow
UnhookWindowsHookEx
SendMessageW
CallWindowProcA
CallWindowProcW
GetWindowThreadProcessId
wvsprintfA
GetAsyncKeyState
engine
?GetGlobal@KJxScript@@QAEHPBD@Z
?GetTableField@KJxScript@@QAEHHPBD@Z
?PushNumber@KJxScript@@QAEHN@Z
?PushString@KJxScript@@QAEHPBD@Z
?SetTableField@KJxScript@@QAEHPBD@Z
?SetTableIndex@KJxScript@@QAEHH@Z
?SetTopIndex@KJxScript@@QAEHH@Z
?CallTableFunction@KJxScript@@QAAHPBD0H0ZZ
?GetTopIndex@KJxScript@@QAEHXZ
?PopStack@KJxScript@@QAEHH@Z
?CallGlobalFunction@KJxScript@@QAAHPBDH0ZZ
?PushTable@KJxScript@@QAEHXZ
?SetGlobalName@KJxScript@@QAEHPBD@Z
?DoFile@KJxScript@@QAEHPBDH@Z
?GetInt@KJxScript@@QAEHH@Z
winmm
timeGetTime
Exports
Exports
GetBreathMsg
InjectDll
UnmapDll
Sections
.text Size: 304KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ