Static task
static1
Behavioral task
behavioral1
Sample
b90190e796400e2047bb69a7b6616900_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
b90190e796400e2047bb69a7b6616900_JaffaCakes118
-
Size
79KB
-
MD5
b90190e796400e2047bb69a7b6616900
-
SHA1
7e33170edd6024dde5989c62c14be1d71875f2ae
-
SHA256
43de4efa707edaea9a80974eac6d6d684e9735086835342448e0653c91e2af36
-
SHA512
edc7e8b7fcdb692678136be7e681c299c010e94c234c2dd58e076e4541c1985bc42b0ff50621c7fcabf17f4df86ab78d9623635b85741a07ddc68ddfcb3da0a5
-
SSDEEP
1536:67+fhUzvbvMTsg2u4a5y4djIDpiOKBg1lQ4re:67+pSvnMODEWl/6
Malware Config
Signatures
Files
-
b90190e796400e2047bb69a7b6616900_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
6a477857791e6bbf67a5253cc57846c2
Code Sign
3a:aa:24:d3:a7:9a:11:59:bd:5f:49:42:5d:b9:47:f4Certificate
IssuerCN=Root AgencyNot Before22/06/2009, 06:42Not After31/12/2039, 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media Player38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
lstrcpyA
lstrcatA
InitializeCriticalSection
GetProcAddress
FlushInstructionCache
GetCurrentProcess
OpenProcess
GetCurrentThreadId
DisableThreadLibraryCalls
CreateThread
TerminateThread
lstrlenW
CloseHandle
GetVersionExA
InterlockedIncrement
LoadLibraryA
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
FreeLibrary
user32
wsprintfA
CharNextA
DestroyWindow
PostMessageA
LoadStringA
CallWindowProcA
GetWindowLongA
SetWindowLongA
GetDC
DefWindowProcA
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
BeginPaint
GetClientRect
EndPaint
GetFocus
IsChild
ReleaseDC
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
ole32
OleInitialize
CoInitialize
CoGetMalloc
StringFromIID
CoCreateInstance
oleaut32
DispCallFunc
LoadRegTypeLi
SysStringLen
SysAllocString
LoadTypeLi
RegisterTypeLi
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
SysFreeString
SafeArrayGetUBound
msvcrt
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_strcmpi
_mbsnbicmp
sprintf
_mbsstr
wcslen
_purecall
_mbsicmp
time
srand
rand
atoi
realloc
_mbsrchr
_except_handler3
??3@YAXPAX@Z
??2@YAPAXI@Z
memmove
__CxxFrameHandler
free
shlwapi
PathFindFileNameA
wininet
InternetGetConnectedState
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ