MPACreateComponentInstance
Static task
static1
Behavioral task
behavioral1
Sample
7213eee1a22063f9c0fb4ea40d54a522_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7213eee1a22063f9c0fb4ea40d54a522_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
7213eee1a22063f9c0fb4ea40d54a522_JaffaCakes118
-
Size
84KB
-
MD5
7213eee1a22063f9c0fb4ea40d54a522
-
SHA1
b13f514f92c4015d946804f494eeb658e3622283
-
SHA256
d27cad84a1959093dd64a3065609110aa1351bcbc6c723f9e8b13a245dadb951
-
SHA512
e53aee20955882c070974415a976cd33581b38d34c158cf4267df84b053c5b300b9948f5ca681284c6206b547f2313336c5c4b1861bc428e7e87a80ca7a7990d
-
SSDEEP
1536:oCEJb13UtPij/5x+sHzkHpyiXZSHYKQZH57:oCEaP25xbHQEfQZZ7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7213eee1a22063f9c0fb4ea40d54a522_JaffaCakes118
Files
-
7213eee1a22063f9c0fb4ea40d54a522_JaffaCakes118.dll windows:4 windows x86 arch:x86
96cfbf3aef66d04b48aee2b7e0c7a086
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
pncrt
_stricmp
_putenv
printf
_adjust_fdiv
_initterm
_onexit
__dllonexit
_ftol
realloc
_strlwr
strrchr
malloc
fclose
strncpy
free
__CxxFrameHandler
?terminate@@YAXXZ
_except_handler3
_purecall
fopen
atoi
vfprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
ole32
CoTaskMemFree
CoFreeUnusedLibraries
OleLockRunning
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
StringFromCLSID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
CoUninitialize
kernel32
FreeLibrary
lstrlenW
SetErrorMode
GetProcAddress
DisableThreadLibraryCalls
GetModuleFileNameA
FindFirstFileA
LoadLibraryA
FindClose
GetCurrentThreadId
lstrcmpA
GetCurrentProcessId
GetCurrentProcess
FlushInstructionCache
InterlockedIncrement
WideCharToMultiByte
DeleteCriticalSection
HeapDestroy
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
MultiByteToWideChar
GetModuleHandleA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
user32
DestroyWindow
GetWindowTextLengthA
EnableWindow
GetParent
GetActiveWindow
GetWindowThreadProcessId
FindWindowExA
SendMessageA
GetSysColor
GetDlgItem
CallWindowProcA
EndPaint
FillRect
BeginPaint
ReleaseDC
GetDC
SetFocus
GetClientRect
ShowWindow
GetClassNameA
RedrawWindow
GetWindowLongA
CreateAcceleratorTableA
ReleaseCapture
SetCapture
InvalidateRect
InvalidateRgn
wsprintfA
RegisterClassA
GetSystemMetrics
CharNextA
UnregisterClassA
CreateWindowExA
IsWindow
IsChild
GetFocus
GetDesktopWindow
GetWindowTextA
SetWindowTextA
SetWindowLongA
GetWindow
RegisterClassExA
DefWindowProcA
SetWindowPos
GetClassInfoExA
RegisterWindowMessageA
LoadCursorA
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
olepro32
ord253
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
DispCallFunc
SysStringLen
LoadRegTypeLi
VariantClear
gdi32
BitBlt
DeleteDC
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
CreateSolidBrush
GetDeviceCaps
GetObjectA
GetStockObject
Exports
Exports
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE