d:\programming\work\Browser.Helpd3\Browser.Help\Release\rvrs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
757b9cc8e9a5b840611a904cf4c36d11_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
757b9cc8e9a5b840611a904cf4c36d11_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
757b9cc8e9a5b840611a904cf4c36d11_JaffaCakes118
-
Size
624KB
-
MD5
757b9cc8e9a5b840611a904cf4c36d11
-
SHA1
28b205398492897442f6ab8343531e5a4f67b0e5
-
SHA256
2ca6add7fb14d31b98b5772751a5127517d752c9e0c16046db03f03f9b1855be
-
SHA512
53ed458c5496712ee213e286228a70f6aece1cdcd5a27df0e251af150eb7ae28094ce40151844247131f9218b3136282a044237b619ff19be18922adf78fd0cd
-
SSDEEP
12288:cDIkK5iiU5HbuLok74ffkKXW84rW3yAsUx9ngQhk52U:cDIkKYbbuLok0faXUxqQu2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 757b9cc8e9a5b840611a904cf4c36d11_JaffaCakes118
Files
-
757b9cc8e9a5b840611a904cf4c36d11_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
4c632a23398d88a7f072a8245a489f5c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
libcurl
curl_global_cleanup
curl_easy_setopt
curl_easy_init
curl_global_init
curl_formfree
curl_formadd
curl_easy_perform
kernel32
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpiW
CreateTimerQueueTimer
DeleteTimerQueueTimer
InterlockedIncrement
GetTickCount
InterlockedDecrement
GetACP
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
CreateProcessA
CreateSemaphoreW
CloseHandle
WaitForSingleObject
ReleaseSemaphore
OpenSemaphoreW
DeleteTimerQueue
EnterCriticalSection
LeaveCriticalSection
OpenMutexW
CreateMutexW
CreateTimerQueue
GetCurrentThreadId
SetThreadLocale
GetThreadLocale
LockResource
FindResourceExW
GetVersionExA
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateFileW
Sleep
WriteFile
ReadFile
GetFileSize
ExitProcess
TerminateThread
GetCurrentProcessId
GetVolumeInformationW
SetErrorMode
GetFileTime
GetWindowsDirectoryW
CreateThread
GetCommandLineW
InitializeCriticalSectionAndSpinCount
GetTempPathW
GetExitCodeProcess
CreateProcessW
GetSystemDirectoryW
SetFileTime
WideCharToMultiByte
HeapFree
GetProcessHeap
InterlockedExchange
GetLocaleInfoA
HeapDestroy
HeapAlloc
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetStdHandle
SetHandleCount
IsValidCodePage
lstrlenW
WriteConsoleW
SetEndOfFile
GetOEMCP
lstrlenA
GetConsoleOutputCP
WriteConsoleA
CreateFileA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetCPInfo
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
HeapCreate
VirtualFree
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualProtect
GetUserDefaultLCID
GetStringTypeExW
LCMapStringA
LCMapStringW
LoadLibraryA
InterlockedCompareExchange
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
user32
LoadStringW
UnregisterClassA
GetForegroundWindow
PostMessageW
AllowSetForegroundWindow
GetMessageW
ShowWindow
GetKeyboardState
GetActiveWindow
FindWindowExW
PostThreadMessageW
CharNextW
SetWindowPos
advapi32
RegEnumKeyExW
GetUserNameW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoInitialize
StringFromGUID2
OleRun
CLSIDFromProgID
CLSIDFromString
CoTaskMemRealloc
oleaut32
SysAllocString
VariantClear
GetErrorInfo
VariantChangeType
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantInit
shlwapi
UrlEscapeW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ