d:\VSS_Source\VC\BackgroundOperation\Source\BackgroundOperation\output\BackgroundOperation.pdb
Static task
static1
Behavioral task
behavioral1
Sample
be34be0e90afbe1d4e48217d9f7fced3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be34be0e90afbe1d4e48217d9f7fced3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
be34be0e90afbe1d4e48217d9f7fced3_JaffaCakes118
-
Size
313KB
-
MD5
be34be0e90afbe1d4e48217d9f7fced3
-
SHA1
c92c54551a09fd17056b3d70d717f1ff699790ee
-
SHA256
f8d9426f8302d0e0a31dcb1318642ef149edb53095a8d4531c5c72e99f88e106
-
SHA512
37f5bd165039928cde78f3a0500c7a733795b0fa637b50e8b486876dd9207c4acfc1a6378228245c97bc0d6f3ff309577a28e13b8ce303365741ebc7104666b9
-
SSDEEP
6144:PYj6w5jQCcHeXapcmhKOyOePrAu6lz5Kp:gj1BQCcHeXapbDeku4Kp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be34be0e90afbe1d4e48217d9f7fced3_JaffaCakes118
Files
-
be34be0e90afbe1d4e48217d9f7fced3_JaffaCakes118.dll windows:4 windows x86 arch:x86
4b30d6e2d1c9d6bcf67c408ef3a6667a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
iphlpapi
GetAdaptersInfo
kernel32
GetTempFileNameW
lstrcpyW
CreateProcessW
SetLastError
CreateMutexW
GetWindowsDirectoryW
FindFirstFileW
FindNextFileW
FindClose
WriteFile
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
lstrlenW
GetLocalTime
CreateFileW
SetFilePointer
DeviceIoControl
SystemTimeToFileTime
CreateFileA
WriteProcessMemory
GetCurrentProcess
GlobalAlloc
GetTickCount
GetModuleHandleW
FlushInstructionCache
MulDiv
lstrcmpW
GlobalLock
GlobalUnlock
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
ResumeThread
GetThreadContext
SetThreadContext
SuspendThread
CompareStringW
CompareStringA
FlushFileBuffers
WriteConsoleW
GetTempPathW
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
RtlUnwind
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetDateFormatA
GetTimeFormatA
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetModuleFileNameA
GetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCommandLineA
GetSystemTimeAsFileTime
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
GetPrivateProfileStringW
GetPrivateProfileIntW
Sleep
CreateThread
CreateEventW
GetCurrentProcessId
SetEvent
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSection
GetLastError
FindResourceExW
LoadResource
MultiByteToWideChar
LockResource
SizeofResource
InterlockedDecrement
FindResourceW
InterlockedIncrement
RaiseException
WaitForSingleObject
CloseHandle
GetCurrentThread
GetProcAddress
LoadLibraryW
GetCurrentThreadId
FreeLibrary
ReadFile
SetEnvironmentVariableA
GetConsoleOutputCP
user32
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
CreateDialogParamW
DefWindowProcW
GetWindowThreadProcessId
FindWindowW
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
SendMessageW
PostThreadMessageW
RegisterWindowMessageW
CreateAcceleratorTableW
GetFocus
RedrawWindow
IsChild
DestroyAcceleratorTable
CharNextW
ReleaseDC
ReleaseCapture
GetSysColor
SetCapture
GetDC
CreateWindowExW
CallWindowProcW
FillRect
GetWindowTextLengthW
MoveWindow
GetDlgItem
GetWindowTextW
RegisterClassExW
InvalidateRect
ShowWindow
UnregisterClassA
SetTimer
KillTimer
BeginPaint
EndPaint
DestroyWindow
GetDesktopWindow
GetClientRect
GetWindowRect
SetWindowPos
SetWindowTextW
GetWindowLongW
SetWindowLongW
SetWindowPlacement
ScreenToClient
GetClassNameW
IsWindow
GetClassInfoExW
SetFocus
GetWindow
InvalidateRgn
GetSystemMetrics
LoadCursorW
GetCursorPos
VkKeyScanW
PostMessageW
InflateRect
SetRect
PtInRect
ClientToScreen
OffsetRect
EnumChildWindows
GetParent
gdi32
GetDeviceCaps
GetObjectW
GetStockObject
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
SelectObject
BitBlt
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
shell32
SHGetPathFromIDListW
SHGetFolderLocation
ole32
OleLockRunning
CoCreateInstance
CoTaskMemAlloc
OleInitialize
StringFromGUID2
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoUninitialize
StringFromCLSID
CoGetClassObject
CreateStreamOnHGlobal
CoTaskMemFree
CoInitialize
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
SafeArrayAccessData
SafeArrayUnaccessData
VariantCopy
SysStringLen
VariantClear
VariantInit
SafeArrayGetLBound
SysStringByteLen
DispCallFunc
OleCreateFontIndirect
LoadTypeLi
SafeArrayGetUBound
LoadRegTypeLi
shlwapi
PathIsRelativeW
PathFindFileNameW
PathFindOnPathW
PathFileExistsW
PathFindExtensionW
StrStrIW
UrlCanonicalizeW
urlmon
CoInternetGetSession
URLDownloadToFileW
URLDownloadToCacheFileW
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
FindCloseUrlCache
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
InternetCrackUrlW
InternetCanonicalizeUrlW
Exports
Exports
SendStatisticDataOnInstall
UpdateIFEOInfo
fnClose
fnOpen
Sections
.text Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ