E:\MyProject\2011\RewriteDM\playUnIEvoke\Release\playUnIEvoke.pdb
Static task
static1
Behavioral task
behavioral1
Sample
be8e141679642a63fe9c23ee1a3db0c7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be8e141679642a63fe9c23ee1a3db0c7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
be8e141679642a63fe9c23ee1a3db0c7_JaffaCakes118
-
Size
402KB
-
MD5
be8e141679642a63fe9c23ee1a3db0c7
-
SHA1
0596deb46a50ba6e27491a4871ac2ddab45ee94b
-
SHA256
3b5f3f51385d6fda2786422fddd4e01025645a87d327b5841656ca5bf4eb72a6
-
SHA512
35c0763d179e3860d7d3161a09ff43a015c5009243996d998a34960a577173d3f33dd12323e7e4932c1a001cb9ae5b0f039d18a338e61a06bdbfa93abefac5fc
-
SSDEEP
12288:/K5WnUp+Bb1PDKh4swyDO16wTIzPlBxIMMv:/K5RO1jTITxIM0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be8e141679642a63fe9c23ee1a3db0c7_JaffaCakes118
Files
-
be8e141679642a63fe9c23ee1a3db0c7_JaffaCakes118.dll windows:5 windows x86 arch:x86
9d5bd33afb2014eb70fa5232010909b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
WSACleanup
WSAStartup
gethostbyname
ole32
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoInitialize
CoUninitialize
wininet
GetUrlCacheEntryInfoA
InternetOpenA
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
urlmon
URLDownloadToFileA
kernel32
ReadFile
CloseHandle
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
FlushViewOfFile
Sleep
FindFirstFileA
FindClose
SetProcessWorkingSetSize
GetCurrentProcess
GetTickCount
DeviceIoControl
GetFullPathNameA
FindResourceA
lstrlenA
FreeLibrary
LoadResource
InterlockedIncrement
InterlockedDecrement
QueryDosDeviceA
UnlockFile
InitializeCriticalSectionAndSpinCount
SizeofResource
LeaveCriticalSection
IsDBCSLeadByte
lstrlenW
RaiseException
CreateDirectoryA
GetLastError
lstrcmpiA
GetProcAddress
RemoveDirectoryA
EnterCriticalSection
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
DeleteCriticalSection
CreateThread
WaitForSingleObject
lstrcpyA
lstrcatA
lstrcmpA
FindNextFileA
SetFileAttributesA
DeleteFileA
lstrcpynA
GetEnvironmentVariableA
GetCurrentDirectoryA
CopyFileA
GetWindowsDirectoryA
FlushInstructionCache
GetCurrentThreadId
SetLastError
SetFilePointer
WriteFile
GetTempFileNameA
GetDriveTypeA
GetShortPathNameA
GetFileSize
GetSystemTimeAsFileTime
GetFileInformationByHandle
GetPrivateProfileStringA
GetCompressedFileSizeA
GetSystemDirectoryA
GetVolumeInformationA
GetVersionExA
CreateProcessA
SetErrorMode
CreateEventA
CreateMutexA
WaitForMultipleObjects
SetEvent
GetFileAttributesA
OpenEventA
LocalFree
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
TlsSetValue
GetLocaleInfoW
GetModuleFileNameW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStartupInfoW
GetFileType
GetStdHandle
SetHandleCount
HeapDestroy
HeapCreate
ExitProcess
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RtlUnwind
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualProtect
DecodePointer
CreateFileA
WideCharToMultiByte
MultiByteToWideChar
GetLocalTime
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
GetCurrentProcessId
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
SetStdHandle
LoadLibraryW
WriteConsoleW
SetEndOfFile
CreateFileW
SearchPathA
TlsFree
EncodePointer
InitializeCriticalSection
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
user32
UpdateWindow
ShowWindow
GetWindow
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
GetParent
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
CallWindowProcA
DefWindowProcA
LoadCursorA
GetClassInfoExA
UnregisterClassA
SetWindowLongA
SetWindowTextA
KillTimer
SetWindowPos
SetActiveWindow
SetTimer
PostQuitMessage
MoveWindow
AdjustWindowRectEx
SendMessageA
DestroyWindow
CharNextA
GetClientRect
GetWindowRect
GetSystemMetrics
LoadImageA
GetWindowLongA
RegisterClassExA
gdi32
DeleteObject
GetTextCharsetInfo
advapi32
InitializeSecurityDescriptor
RegQueryValueExA
RegNotifyChangeKeyValue
RegCloseKey
RegSetKeySecurity
RegQueryValueA
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
RegSetValueExA
RegSetValueA
SetSecurityDescriptorDacl
oleaut32
SysAllocString
VariantClear
SysAllocStringLen
SysFreeString
VarUI4FromStr
Exports
Exports
Always
ConfigAd
PutTestSpecial
_2
msnpop
qqadpop
qweAwse
Sections
.text Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ