Static task
static1
Behavioral task
behavioral1
Sample
aa948be8f1e2e3f79259de7620e37328_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
aa948be8f1e2e3f79259de7620e37328_JaffaCakes118
-
Size
79KB
-
MD5
aa948be8f1e2e3f79259de7620e37328
-
SHA1
0fd4f68baace28ca5cb220103a805480d947e420
-
SHA256
a4f0220986c0a72ee5ce890603ae66271a1469f9680767f5f38f2c41ef70eb09
-
SHA512
317d32d8078668fa4c7ee2d2099c4767e1beb9736d61d544f0c77925977fe0d8ada15b587748ad62501944cd941d4c74acc533a1bde17bea4682447d8a681c49
-
SSDEEP
768:6eUz+kvU0FxxfwsjNqiBfHmlEh4nsT5vIv29yIiB9PDpYy5psVablD+UxK6JrexF:6NBU0FLfRq4fXxT5wvpl8slDTXJrmoO
Malware Config
Signatures
Files
-
aa948be8f1e2e3f79259de7620e37328_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
003d88d6485ea403134879a8a4dc47d3
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US41:91:a1:5a:39:78:df:cf:49:65:66:38:1d:4c:75:c2Certificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before16/07/2004, 00:00Not After15/07/2014, 23:59SubjectCN=VeriSign Class 3 Code Signing 2004 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)04,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
65:f9:83:90:a7:47:1d:91:5c:97:cf:f7:6e:ee:cf:3dCertificate
IssuerCN=VeriSign Class 3 Code Signing 2004 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)04,O=VeriSign\, Inc.,C=USNot Before26/01/2007, 00:00Not After26/01/2008, 23:59SubjectCN=DigitalNames,OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Technology Team,O=DigitalNames,L=Gangnam-gu,ST=Seoul,C=KRExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
aa:d4:76:33:9c:7e:f8:2e:6a:dc:a0:61:27:47:17:90:b8:c2:14:84Signer
Actual PE Digestaa:d4:76:33:9c:7e:f8:2e:6a:dc:a0:61:27:47:17:90:b8:c2:14:84Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
atl
ord15
ord18
ord57
ord16
ord30
ord58
ord21
ord23
ord32
ord31
kernel32
GetProcAddress
LoadLibraryA
lstrcpyA
DisableThreadLibraryCalls
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
FreeLibrary
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
GetCurrentThreadId
OutputDebugStringA
lstrcmpiA
lstrlenW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
RtlUnwind
HeapFree
HeapAlloc
GetLastError
WideCharToMultiByte
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
GetModuleHandleA
MultiByteToWideChar
LCMapStringA
user32
FindWindowExA
GetClassNameA
GetWindow
IsWindowVisible
SendMessageA
GetForegroundWindow
GetTopWindow
RegisterWindowMessageA
UnhookWindowsHookEx
FindWindowA
SendMessageTimeoutA
wsprintfA
SetWindowTextA
GetFocus
GetWindowTextA
CallNextHookEx
EnumThreadWindows
IsWindow
SetWindowsHookExA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ole32
CoUninitialize
CoInitialize
oleaut32
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DNHOOKD Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ