Static task
static1
Behavioral task
behavioral1
Sample
c18a0d1b51c48a78d86609993bd20a1e_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
c18a0d1b51c48a78d86609993bd20a1e_JaffaCakes118
-
Size
79KB
-
MD5
c18a0d1b51c48a78d86609993bd20a1e
-
SHA1
32750e9b773cec13647fe055f0e7ff5aa8f8f74b
-
SHA256
07ba8068e85d41b92177b762f80e1eade472da2bda1ddb12d9d0738a0e3b4b93
-
SHA512
a679e8ebcb8058c3700d0bed39e2b316e223065b10d382d192461043ea8b69c96757f170e3c5268c73fb608a595b5019827e5765994cd86fdb13529cb0447aae
-
SSDEEP
1536:mkEsPOkcjU1OJRfV3GVyapYjYJU+snLaO6JrO:m9+OyALlaaYJJsLP6JC
Malware Config
Signatures
Files
-
c18a0d1b51c48a78d86609993bd20a1e_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
4bc910d4108dbf611fc053f8eb186d57
Code Sign
3a:aa:24:d3:a7:9a:11:59:bd:5f:49:42:5d:b9:47:f4Certificate
IssuerCN=Root AgencyNot Before22/06/2009, 06:42Not After31/12/2039, 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media Player38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateThread
DisableThreadLibraryCalls
GetCurrentThreadId
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
lstrcpyA
lstrcatA
GetSystemTime
GetProcAddress
LoadLibraryA
FlushInstructionCache
GetCurrentProcess
DebugBreak
OutputDebugStringA
OpenProcess
CreateThread
CreateFileA
lstrlenW
GetFileSize
ReadFile
CloseHandle
GetVersionExA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
FreeLibrary
user32
wsprintfA
CharNextA
FindWindowA
DestroyWindow
DefWindowProcA
IsChild
GetFocus
EndPaint
PostMessageA
wvsprintfA
CallWindowProcA
GetWindowLongA
SetWindowLongA
LoadStringA
GetDC
ReleaseDC
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
BeginPaint
GetClientRect
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
oleaut32
SysFreeString
DispCallFunc
LoadRegTypeLi
SysStringLen
SysAllocString
LoadTypeLi
RegisterTypeLi
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
urlmon
URLDownloadToFileA
msvcrt
_adjust_fdiv
_initterm
_onexit
__dllonexit
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
_strcmpi
_ismbcdigit
wcslen
_purecall
_mbsicmp
_mbsrchr
_ismbcspace
srand
rand
_mbsstr
atoi
realloc
time
sprintf
_except_handler3
malloc
free
??3@YAXPAX@Z
??2@YAPAXI@Z
memmove
__CxxFrameHandler
shlwapi
PathFindFileNameA
PathFileExistsA
wininet
DeleteUrlCacheEntry
InternetGetConnectedState
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ