d:\.Depot\Current\Client\DataProxy\Release\dprx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d37f144ad853fdfb9fac2aecd1c83c8c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d37f144ad853fdfb9fac2aecd1c83c8c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d37f144ad853fdfb9fac2aecd1c83c8c_JaffaCakes118
-
Size
297KB
-
MD5
d37f144ad853fdfb9fac2aecd1c83c8c
-
SHA1
9f899f9771b15b3b7d0210ab6fdbb1b62597d6f9
-
SHA256
45e17bec790868300268a26f559008ab338239cfea2f28c5a1c294db92639786
-
SHA512
2710da752a3f1925f39e5e20deb5b49b3c0d2f9de5901edab40857afde913a4fbfbe749faf2e5b22d018ca4526bbc09955fa6ac1a2e0cd3742f0090b53aeb978
-
SSDEEP
6144:mkosaAuAc09rH2FBGME9PEqhLFdSW/jHxX/jI:1osaAuYWFBXE9PNvSW/jHxX/jI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d37f144ad853fdfb9fac2aecd1c83c8c_JaffaCakes118
Files
-
d37f144ad853fdfb9fac2aecd1c83c8c_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
1d0078559c1c1127aa33e55a4a9c93bd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
proxy
?Close@CProxy@@QAEXXZ
?SynchronizeTime@CProxy@@QAEJPAG@Z
?SendRemoteHttpRequest@CProxy@@QAEJPAGJPAUtagVARIANT@@1J10@Z
??1CProxy@@QAE@XZ
??0CProxy@@QAE@XZ
?LoadDll@CProxy@@QAEJPBG@Z
?Open@CProxy@@QAEJHPAX@Z
?GeoLocate@CProxy@@QAEJXZ
kernel32
SetEvent
ResetEvent
CancelIo
WaitForMultipleObjects
CreateEventW
DuplicateHandle
TerminateThread
GetExitCodeThread
Sleep
FindClose
FindNextFileW
CreateFileW
FindFirstFileW
lstrcpyW
GetSystemTimeAsFileTime
GetTempPathW
FileTimeToSystemTime
GetTickCount
SetThreadPriority
GetCurrentThreadId
GetFileAttributesExW
HeapFree
GetProcessHeap
GetFileTime
CompareFileTime
HeapAlloc
DeleteFileW
GetTempFileNameW
SetLastError
OpenProcess
GetCurrentThread
ReadFile
GetFileSize
MoveFileExW
FlushFileBuffers
WriteFile
SetFileAttributesW
ReleaseSemaphore
InterlockedExchangeAdd
UnmapViewOfFile
MapViewOfFile
lstrcatW
LocalAlloc
SetFilePointer
GlobalAlloc
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalLock
CreateSemaphoreW
lstrcpynW
CreateFileA
CreateFileMappingW
ProcessIdToSessionId
OpenFileMappingW
lstrcpynA
CreateDirectoryW
CreateMutexA
GlobalSize
GetSystemTime
SetFileTime
WriteConsoleA
SetStdHandle
SetSystemTime
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
ReleaseMutex
CreateMutexW
FindResourceExW
LockResource
DisableThreadLibraryCalls
lstrlenA
LoadLibraryW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
GetLastError
GetModuleFileNameW
GetSystemDirectoryW
lstrcmpiW
WaitForSingleObject
lstrcatA
CreateEventA
InterlockedDecrement
InterlockedIncrement
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
GetModuleHandleW
GetProcAddress
GetCurrentProcess
FreeLibrary
GetVersionExW
GetComputerNameW
lstrlenW
LocalFree
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
HeapCreate
ExitProcess
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleA
VirtualProtect
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CreateThread
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapDestroy
HeapReAlloc
HeapSize
LoadLibraryA
VirtualFree
VirtualAlloc
RtlUnwind
ExitThread
user32
UnregisterClassA
CharLowerW
CharNextW
KillTimer
SetTimer
GetWindowThreadProcessId
IsWindow
CharLowerBuffW
GetDesktopWindow
SendMessageW
RegisterWindowMessageW
PostMessageW
advapi32
RegSetValueExW
RegOpenKeyExW
ConvertSidToStringSidW
LookupAccountNameW
ConvertStringSidToSidW
SetNamedSecurityInfoW
IsValidSid
DuplicateTokenEx
SetTokenInformation
CryptDeriveKey
CryptDecrypt
CryptEncrypt
ImpersonateLoggedOnUser
OpenThreadToken
RevertToSelf
GetTokenInformation
CryptDestroyKey
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegGetKeySecurity
RegOpenKeyW
RegSetKeySecurity
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
shell32
SHCreateDirectoryExW
ole32
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoTaskMemFree
CoInitializeEx
GetHGlobalFromStream
StringFromCLSID
oleaut32
SafeArrayDestroy
SafeArrayPutElement
SafeArrayGetElement
VarI4FromStr
SafeArrayCreate
SafeArrayUnaccessData
SysStringByteLen
SysAllocStringByteLen
SafeArrayRedim
VariantInit
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
VarBstrFromI4
VarBstrFromR8
SysAllocString
SysAllocStringLen
SysStringLen
VarBstrCat
SysFreeString
VarBstrCmp
SafeArrayCreateVector
VariantClear
SafeArrayAccessData
shlwapi
SHCreateStreamOnFileW
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
rpcrt4
UuidCreate
iphlpapi
NotifyAddrChange
wtsapi32
WTSCloseServer
WTSQuerySessionInformationW
WTSOpenServerW
WTSFreeMemory
netapi32
NetWkstaUserEnum
NetApiBufferFree
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ