Static task
static1
Behavioral task
behavioral1
Sample
a9e4ec6d3c5139c8612135e08b233fee_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
a9e4ec6d3c5139c8612135e08b233fee_JaffaCakes118
-
Size
53KB
-
MD5
a9e4ec6d3c5139c8612135e08b233fee
-
SHA1
167782c8ad36f97eeb034583239e8643784e8f89
-
SHA256
83f1c31b74e1ced63cf04834d0e64a6e0cbf5c1f7ea52cadfc16aaac7c441765
-
SHA512
3fa1b78ce860894ad00328a1c043792c697c621bcc0d5839a2fd53d774a273c5d6f2f21dbfb1b44e35cff4601b0be4573b24a42ace269208c830b26adf3ce9ea
-
SSDEEP
768:JPPmhgNjc/P8kcaB8vTyYTjjZi25ziKWheuGQxZDgh3HYRtUk:5PudiLWsuGQDEXYRtUk
Malware Config
Signatures
Files
-
a9e4ec6d3c5139c8612135e08b233fee_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
ebdcea0f765312164083c7dceb001837
Code Sign
7d:87:fd:d2:76:85:1d:6b:b9:3e:35:ea:72:5b:98:6aCertificate
IssuerCN=Root AgencyNot Before16-09-2009 07:50Not After31-12-2039 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media PlayerSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetProcAddress
lstrcpyA
lstrcatA
GetCurrentThreadId
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
LeaveCriticalSection
DisableThreadLibraryCalls
CreateThread
TerminateThread
CloseHandle
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
GetModuleFileNameA
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
lstrlenA
MultiByteToWideChar
lstrlenW
InitializeCriticalSection
user32
wsprintfA
GetDC
DestroyWindow
PostMessageA
LoadStringA
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
BeginPaint
GetClientRect
EndPaint
CharNextA
ReleaseDC
GetFocus
IsChild
GetClassInfoExA
LoadCursorA
RegisterClassExA
DefWindowProcA
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegSetValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
OleInitialize
oleaut32
SysStringLen
LoadRegTypeLi
DispCallFunc
LoadTypeLi
RegisterTypeLi
SysAllocString
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
SysFreeString
msvcrt
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
_purecall
memcmp
time
atoi
strcpy
_mbsrchr
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
sprintf
strlen
_mbsstr
wcslen
_mbsicmp
__CxxFrameHandler
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
memset
realloc
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
shlwapi
PathFindFileNameA
wininet
InternetGetConnectedState
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gogouuc
setsys
setuuc
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ