d:\programming\work\Browser.Helpd3\Browser.Help\Release\rvrs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae88d92761a60dcb4fe75a0a6ecf53b4_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ae88d92761a60dcb4fe75a0a6ecf53b4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ae88d92761a60dcb4fe75a0a6ecf53b4_JaffaCakes118
-
Size
648KB
-
MD5
ae88d92761a60dcb4fe75a0a6ecf53b4
-
SHA1
c1bd016e5e0bfe0984a46b4af2cd13a64b78a89f
-
SHA256
93f6212b2016b66b85eb5eed5f18c8dbc22b9f9f42a1b453ef1f47b8561f7b39
-
SHA512
96c088e2e38df29e2b923c4c04cb736776d70ea09c9d59073b8a29e5548631db8346f88be18225b69deeb974a869dc1d01a7d9d760c707a3b91dfb0ef9cfec9a
-
SSDEEP
6144:YGE1uVRcaRA6zhQ68ZxoE+rylRAPYdYxtExCFY40jPgOh3nTtwhbxgq2:DE1uVRnl9Q9f+rybq5/ExC3Oh3nOgq2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae88d92761a60dcb4fe75a0a6ecf53b4_JaffaCakes118
Files
-
ae88d92761a60dcb4fe75a0a6ecf53b4_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
795b1a56087474059bdf5ba033aef3c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
libcurl
curl_global_cleanup
curl_easy_setopt
curl_easy_init
curl_global_init
curl_formfree
curl_formadd
curl_easy_perform
kernel32
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpiW
CreateTimerQueueTimer
DeleteTimerQueueTimer
InterlockedIncrement
InterlockedDecrement
GetACP
GetTickCount
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
CreateProcessA
CreateSemaphoreW
CloseHandle
WaitForSingleObject
ReleaseSemaphore
OpenSemaphoreW
DeleteTimerQueue
EnterCriticalSection
LeaveCriticalSection
OpenMutexW
CreateMutexW
CreateTimerQueue
GetCurrentThreadId
SetThreadLocale
GetThreadLocale
LockResource
FindResourceExW
GetVersionExA
CreateFileW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
Sleep
WriteFile
ReadFile
GetFileSize
ExitProcess
TerminateThread
GetCurrentProcessId
GetVolumeInformationW
SetErrorMode
GetFileTime
GetWindowsDirectoryW
CreateThread
GetCommandLineW
InitializeCriticalSectionAndSpinCount
GetTempPathW
GetExitCodeProcess
CreateProcessW
GetSystemDirectoryW
SetFileTime
WideCharToMultiByte
HeapFree
GetProcessHeap
InterlockedExchange
GetLocaleInfoA
HeapDestroy
HeapAlloc
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetStdHandle
SetHandleCount
IsValidCodePage
lstrlenW
WriteConsoleW
SetEndOfFile
GetOEMCP
lstrlenA
GetConsoleOutputCP
WriteConsoleA
CreateFileA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetCPInfo
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
HeapCreate
VirtualFree
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualProtect
GetUserDefaultLCID
GetStringTypeExW
LCMapStringA
LCMapStringW
LoadLibraryA
InterlockedCompareExchange
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
user32
LoadStringW
UnregisterClassA
GetForegroundWindow
PostMessageW
AllowSetForegroundWindow
GetMessageW
ShowWindow
FindWindowExW
GetKeyboardState
GetActiveWindow
PostThreadMessageW
CharNextW
SetWindowPos
advapi32
RegEnumKeyExW
GetUserNameW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoInitialize
StringFromGUID2
OleRun
CLSIDFromProgID
CLSIDFromString
CoTaskMemRealloc
oleaut32
SysAllocString
VariantClear
GetErrorInfo
VariantChangeType
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantInit
shlwapi
UrlEscapeW
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 524KB - Virtual size: 521KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ