Static task
static1
Behavioral task
behavioral1
Sample
b8d68f506217c5c011e1464cb6841fbd_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
b8d68f506217c5c011e1464cb6841fbd_JaffaCakes118
-
Size
53KB
-
MD5
b8d68f506217c5c011e1464cb6841fbd
-
SHA1
d44f1043a1ffcaaea587fd02c9f14a03bdfce886
-
SHA256
e4579afafda9f9f44a3f8580f936f0b92185a76075eb0c57f360588f8216d417
-
SHA512
412ce6390118be34d6d24aa6081c89b25dbfd73e5758c7b35fdc9be7a8aed2da3aae897d8f073143600bd8c76acac2bcfd5bc1910b9f2d219accc9dc418863b6
-
SSDEEP
768:jhM0xVR//I5cVIRYYlYbGjZiwRzAgS/heDoVjxZDghSTyg1dyH9WH:lVHQ/K/sDoVjDEIyedU0H
Malware Config
Signatures
Files
-
b8d68f506217c5c011e1464cb6841fbd_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
ebdcea0f765312164083c7dceb001837
Code Sign
7d:87:fd:d2:76:85:1d:6b:b9:3e:35:ea:72:5b:98:6aCertificate
IssuerCN=Root AgencyNot Before16/09/2009, 07:50Not After31/12/2039, 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media PlayerSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetProcAddress
lstrcpyA
lstrcatA
GetCurrentThreadId
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
LeaveCriticalSection
DisableThreadLibraryCalls
CreateThread
TerminateThread
CloseHandle
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
GetModuleFileNameA
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
lstrlenA
MultiByteToWideChar
lstrlenW
InitializeCriticalSection
user32
wsprintfA
GetDC
DestroyWindow
PostMessageA
LoadStringA
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
BeginPaint
GetClientRect
EndPaint
CharNextA
ReleaseDC
GetFocus
IsChild
GetClassInfoExA
LoadCursorA
RegisterClassExA
DefWindowProcA
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegSetValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
OleInitialize
oleaut32
SysStringLen
LoadRegTypeLi
DispCallFunc
LoadTypeLi
RegisterTypeLi
SysAllocString
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
SysFreeString
msvcrt
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
_purecall
memcmp
time
atoi
strcpy
_mbsrchr
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
sprintf
strlen
_mbsstr
wcslen
_mbsicmp
__CxxFrameHandler
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
memset
realloc
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
shlwapi
PathFindFileNameA
wininet
InternetGetConnectedState
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gogouuc
setuuc
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ