e:\SpeedNet\BIN-new\Release\6up7.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a05f1065194a27a6615509bb8a957a3d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a05f1065194a27a6615509bb8a957a3d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a05f1065194a27a6615509bb8a957a3d_JaffaCakes118
-
Size
652KB
-
MD5
a05f1065194a27a6615509bb8a957a3d
-
SHA1
52c0bd68fc5435854462f2cc723033629e3de9d2
-
SHA256
b39c564b20e0d68bc4bbcada5f6f4ea2eae20d152ff90e84631e9aef90c4e64b
-
SHA512
e9c0bd4873d1dbcc8ac1f800a182c0a0d5d38bce4019f783d20deab4ec3422143e793abe29d820cb2d58646ce8d24e4b0c4dbcbf74861df61647e40b613d2391
-
SSDEEP
12288:xdkUFWWgRjCpO4+8I6/L8rQ+h7YQ4sG3bRIMsr2T8G+JOcG4:Qk8KOCI6/L8Dh7py9IMsqT4JOo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a05f1065194a27a6615509bb8a957a3d_JaffaCakes118
Files
-
a05f1065194a27a6615509bb8a957a3d_JaffaCakes118.dll windows:4 windows x86 arch:x86
1c6c52e23d7c80af27dd86a83fdca83f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
netapi32
Netbios
kernel32
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
ExitThread
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
HeapSize
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
GetACP
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetExitCodeProcess
GetLocaleInfoW
SetEnvironmentVariableA
GetThreadLocale
CreateFileW
GetFullPathNameA
GetFileAttributesA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
SetErrorMode
LocalAlloc
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
LocalFree
GlobalAlloc
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
MulDiv
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
CompareStringW
CompareStringA
GetVersion
InterlockedExchange
GetProcessHeap
HeapAlloc
HeapFree
ReleaseMutex
OpenMutexA
CreateMutexA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetModuleFileNameA
lstrcatA
ExitProcess
GetPrivateProfileIntA
CreateFileA
GetFileTime
OpenProcess
CreateProcessA
GetCurrentProcessId
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrlenA
FindResourceA
LoadResource
LockResource
SizeofResource
ExpandEnvironmentStringsA
GetCommandLineA
FindFirstFileA
SetFileAttributesA
FindNextFileA
FindClose
CreateToolhelp32Snapshot
Process32First
Process32Next
GetVersionExA
GetModuleHandleA
GetSystemInfo
CreateThread
WaitForSingleObject
CreateDirectoryA
MultiByteToWideChar
WideCharToMultiByte
DeleteFileA
CreateFileMappingA
GetLastError
CloseHandle
LoadLibraryA
GetSystemDirectoryA
GetProcAddress
FreeLibrary
GetTickCount
Sleep
GetStartupInfoA
user32
CharNextA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
InvalidateRgn
SetRect
CopyAcceleratorTableA
DestroyMenu
GetMenuItemInfoA
UnregisterClassA
GetSysColorBrush
ValidateRect
GetCursorPos
SetCursor
LoadCursorA
SetWindowRgn
DrawIcon
InvalidateRect
PostQuitMessage
InflateRect
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
GetClassInfoExA
GetClassInfoA
RegisterClassA
PtInRect
LoadBitmapA
GetWindowRect
GetClientRect
SetTimer
KillTimer
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
IsIconic
GetWindowPlacement
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
PostThreadMessageA
MessageBeep
GetNextDlgGroupItem
MapDialogRect
RegisterClipboardFormatA
ShowOwnedPopups
SetWindowContextHelpId
RemovePropA
EnableWindow
SystemParametersInfoA
CopyRect
RedrawWindow
SetCapture
ReleaseCapture
ShowWindow
IsWindowVisible
DispatchMessageA
TranslateMessage
PeekMessageA
SendMessageA
GetSystemMetrics
DefWindowProcA
GetWindowThreadProcessId
GetWindow
GetDesktopWindow
FindWindowA
GetMessageA
SetActiveWindow
SetWindowPos
CreateWindowExA
RegisterClassExA
GetActiveWindow
CharUpperA
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
UnhookWindowsHookEx
FillRect
IsRectEmpty
gdi32
CreateSolidBrush
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
CreateEllipticRgn
LPtoDP
Ellipse
GetTextExtentPoint32A
GetRgnBox
CreateCompatibleBitmap
GetBkColor
GetTextColor
GetDeviceCaps
GetStockObject
CreateBitmap
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
GetObjectA
CreateFontA
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
BitBlt
CreateCompatibleDC
ScaleViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
GetUserNameA
RegCreateKeyA
OpenProcessToken
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegQueryValueA
shell32
SHGetFolderPathA
DragFinish
DragQueryFileA
SHGetSpecialFolderPathA
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
UrlUnescapeA
oledlg
ord8
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantChangeType
VariantInit
SysAllocStringLen
SysAllocString
SysStringLen
SysAllocStringByteLen
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantCopy
VariantClear
OleCreateFontIndirect
SysFreeString
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
ws2_32
shutdown
closesocket
gethostbyname
getpeername
ntohl
wininet
InternetCanonicalizeUrlA
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryDataAvailable
InternetQueryOptionA
InternetCrackUrlA
Exports
Exports
??4CGS1@@QAEAAV0@ABV0@@Z
GetModuleInfo
WSPStartup
Sections
.text Size: 392KB - Virtual size: 389KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ