e:\120111_121634_build_KangoBox_KangoBox_1.0.2.0\source\source_sa\Bin\Release\Install.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c24b0dbe8e01d6e3e5035874066a580f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c24b0dbe8e01d6e3e5035874066a580f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c24b0dbe8e01d6e3e5035874066a580f_JaffaCakes118
-
Size
246KB
-
MD5
c24b0dbe8e01d6e3e5035874066a580f
-
SHA1
26369bd5ab11ea5bde7c733fadadb50e0669bf48
-
SHA256
a7ca90a7fd971022c06dd9e9c61e10a4c0ac74c242f72ff9c9fa82314a6e9bac
-
SHA512
ba4a10a69cc7f2e8546fa31fb4be0a9982a6320a4801c9140b6a81f1ae1a7069b7a7e83b78dd71134af15ba72142760b52950bdc442427565ed6dbfbe22be992
-
SSDEEP
3072:KOrrJ8fUr2oE+xT9ha5oPUsbyE6HdWrqLwyPsXvNnEBZ9HFRRQlWmUNbM4W4eJXF:hdVSo5bp69Wrus5KZ9HFfw24d9F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c24b0dbe8e01d6e3e5035874066a580f_JaffaCakes118
Files
-
c24b0dbe8e01d6e3e5035874066a580f_JaffaCakes118.dll windows:5 windows x86 arch:x86
76b3a21649e5fd351adf6c401d29fe48
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
CryptReleaseContext
CryptCreateHash
CryptDestroyHash
CryptDeriveKey
CryptDestroyKey
CryptDecrypt
CryptHashData
RegCreateKeyExA
LookupAccountNameA
ConvertSidToStringSidA
CryptAcquireContextA
rpcrt4
UuidCreate
wininet
FindNextUrlCacheEntryA
FindCloseUrlCache
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
kernel32
LocalFree
CreateDirectoryA
lstrcmpA
MultiByteToWideChar
DeleteFileA
GetTempFileNameA
GetTempPathA
GetModuleFileNameA
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrlenA
CreateEventA
OpenEventA
SetEvent
GlobalFree
lstrcpyA
lstrcpynA
GlobalAlloc
CreateProcessA
WriteFile
SetFilePointer
CreateFileA
OutputDebugStringA
GetLocalTime
GetVersion
GetShortPathNameA
ReadFile
GetFileSize
GetWindowsDirectoryA
GetFileAttributesA
LocalAlloc
GetTickCount
GetCommandLineA
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
ResumeThread
CreateThread
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
OpenProcess
GetCurrentProcess
TerminateProcess
GetPrivateProfileStringA
LoadLibraryExA
SetLastError
GetComputerNameA
SetErrorMode
GetDriveTypeA
GetComputerNameExA
GetSystemDirectoryA
GetOEMCP
GetACP
GetThreadLocale
GetUserDefaultLangID
GetSystemDefaultLangID
DosDateTimeToFileTime
GetProcessHeap
HeapFree
HeapAlloc
WritePrivateProfileStringA
FlushFileBuffers
LoadLibraryW
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
LCMapStringW
WaitForSingleObject
IsProcessorFeaturePresent
GetModuleFileNameW
GetStdHandle
ExitProcess
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetCPInfo
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DecodePointer
EncodePointer
Sleep
CloseHandle
GetVolumeInformationA
LoadLibraryA
GetProcAddress
FreeLibrary
FindFirstFileA
GetLastError
FindNextFileA
FindClose
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetStdHandle
WriteConsoleW
CreateFileW
RtlUnwind
HeapSize
HeapReAlloc
HeapDestroy
RaiseException
InitializeCriticalSectionAndSpinCount
user32
SendMessageA
FindWindowA
ReleaseDC
wsprintfA
EnumWindows
GetClassNameA
PostMessageA
GetWindowTextA
IsWindowVisible
EnumChildWindows
RegisterWindowMessageA
SendMessageTimeoutA
FindWindowExA
GetDC
gdi32
GetDeviceCaps
shell32
SHGetFolderPathA
ole32
CLSIDFromString
CoInitialize
CLSIDFromProgID
CoCreateInstance
oleaut32
VariantClear
SysAllocStringByteLen
SysStringByteLen
VariantInit
SysFreeString
SysAllocStringLen
shlwapi
PathIsDirectoryA
PathFileExistsA
Exports
Exports
CheckToolbarEnabled
ClearPendingRebootFileOperations
CloseClient
ClosePartnerWindows
CreateCSID
CreateDir
CreateMachineID
DPIScale
DecryptString
Delete_IECookies
EncryptString
Get
GetBannerID
GetBridgeID
GetCVFValue
GetClientCSCID
GetClientInfo
GetClientUmt
GetConfigUrl
GetDid
GetEParamStatus
GetInstallerLoc
GetMessaging
GetPartnerId
GetRepairLoc
GetStringResource
GetTempExe
GetUninstallerLoc
InstallerStop
IsElevated
IsFFDefaultBrowser
IsOtherProductInstalled
IsPaidHB
IsProductInstalled
KeyExists
KillClient
LoadSettingsFromWeb
Log
LogDataStore
ParseCmdLine
PartnerIsRunning
RunAsAdmin
RunAsUser
SendHttpRequest
SendTrackedEvent
Set
SetBannerID
SetBridgeID
SetCVFValue
SetClientCSCID
SetClientUmt
SetConfigUrl
SetDid
SetInstallerLoc
SetLogPath
SetMessaging
SetPartnerId
SetRepairLoc
SetUninstallerLoc
ShowDialog
ShowToaster
ShowURLDialog
StartEvent
StopEvent
TurnOnToolbarInIE
VersionCompare
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ