e:\101215_153018_build_StPauliGirl\Client_Build_StPauliGirl_10.0.630.0\compile\source_sa\Bin\release\Install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b76c48ca1fd45447b4b16a17d70911e4_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b76c48ca1fd45447b4b16a17d70911e4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b76c48ca1fd45447b4b16a17d70911e4_JaffaCakes118
-
Size
221KB
-
MD5
b76c48ca1fd45447b4b16a17d70911e4
-
SHA1
fbd47c37742536dd8e3d68d5ed4d0a915a2931d3
-
SHA256
9b704b05174b5e4337467dcc411b19ad8dd0b325c541ae460a63fd5d0cd445d0
-
SHA512
2d8411f593309a81920d191a5316e3882dfc64c87c4e3403eff3c87388d34169dab581dd55d4778ff32c247fc5ffa53ed6ac0ebe91bbdb1ca3646ec4f6460468
-
SSDEEP
3072:hp3kkYpYoeAjUICXcO/rFPSoFVQlePCYCi4DNmzFXFB5pqg9kLo:h1sqXVQfjD2Lkfo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b76c48ca1fd45447b4b16a17d70911e4_JaffaCakes118
Files
-
b76c48ca1fd45447b4b16a17d70911e4_JaffaCakes118.dll windows:4 windows x86 arch:x86
8f7c18b9a34dbfc2c5977e2a361ee8ab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
CryptReleaseContext
CryptCreateHash
CryptDestroyHash
CryptDeriveKey
CryptDestroyKey
CryptDecrypt
CryptHashData
RegCreateKeyExA
LookupAccountNameA
ConvertSidToStringSidA
CryptAcquireContextA
rpcrt4
UuidCreate
wininet
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindCloseUrlCache
kernel32
FindClose
FindNextFileA
FindFirstFileA
FreeLibrary
GetProcAddress
LoadLibraryA
GetVolumeInformationA
CloseHandle
Sleep
TerminateProcess
WaitForSingleObject
OpenProcess
LocalFree
CreateDirectoryA
lstrcmpA
DeleteFileA
GetTempFileNameA
GetTempPathA
GetModuleFileNameA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
OpenEventA
SetEvent
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
CreateProcessA
WriteFile
SetFilePointer
CreateFileA
OutputDebugStringA
GetLocalTime
GetShortPathNameA
ReadFile
GetFileSize
GetWindowsDirectoryA
GetFileAttributesA
LocalAlloc
GetTickCount
GetCommandLineA
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
ResumeThread
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetModuleHandleA
GetPrivateProfileStringA
LoadLibraryExA
SetLastError
GetComputerNameA
GetDriveTypeA
SetErrorMode
GetComputerNameExA
GetSystemDirectoryA
GetOEMCP
GetACP
GetThreadLocale
GetUserDefaultLangID
GetSystemDefaultLangID
DosDateTimeToFileTime
GetProcessHeap
HeapFree
HeapAlloc
WritePrivateProfileStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetCPInfo
IsDebuggerPresent
CreateThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStdHandle
SetStdHandle
GetConsoleMode
GetConsoleCP
ExitProcess
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapSize
lstrlenA
GetVersion
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RaiseException
HeapDestroy
HeapReAlloc
user32
GetWindowTextA
IsWindowVisible
RegisterWindowMessageA
SendMessageTimeoutA
FindWindowExA
GetDC
ReleaseDC
FindWindowA
SendMessageA
wsprintfA
EnumWindows
GetClassNameA
PostMessageA
EnumChildWindows
UnregisterClassA
gdi32
GetDeviceCaps
shell32
SHGetFolderPathA
ole32
CoInitialize
CLSIDFromString
CoCreateInstance
CLSIDFromProgID
oleaut32
SysFreeString
VariantInit
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
VariantClear
shlwapi
PathIsDirectoryA
PathFileExistsA
Exports
Exports
AddHiJackThis
CheckToolbarEnabled
ClearPendingRebootFileOperations
CloseClient
ClosePartnerWindows
CreateCSID
CreateDir
CreateMachineID
DPIScale
DecryptString
Delete_IECookies
EncryptString
Get
GetBannerID
GetBridgeID
GetCVFValue
GetClientCSCID
GetClientInfo
GetClientUmt
GetConfigUrl
GetDid
GetEParamStatus
GetInstallerLoc
GetMessaging
GetPartnerId
GetRepairLoc
GetStringResource
GetTempExe
GetUninstallerLoc
InstallerStop
IsElevated
IsFFDefaultBrowser
IsNecessaryButNotSufficient
IsPaidHB
KeyExists
KillClient
LoadSettingsFromWeb
Log
LogDataStore
ParseCmdLine
PartnerIsRunning
RunAsAdmin
RunAsUser
SendHttpRequest
SendTrackedEvent
Set
SetBannerID
SetBridgeID
SetCVFValue
SetClientCSCID
SetClientUmt
SetConfigUrl
SetDid
SetInstallerLoc
SetLogPath
SetMessaging
SetPartnerId
SetRepairLoc
SetUninstallerLoc
ShowDialog
ShowToaster
ShowURLDialog
StartEvent
StopEvent
TurnOnToolbarInIE
VersionCompare
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ