mcff.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db63637db632087b677fc152a0e7b7f7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db63637db632087b677fc152a0e7b7f7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
db63637db632087b677fc152a0e7b7f7_JaffaCakes118
-
Size
540KB
-
MD5
db63637db632087b677fc152a0e7b7f7
-
SHA1
c7bb6417500788f0f826a38e10734f3b39805365
-
SHA256
e69f8004b35ef230b11899886bee3b5165c16457c2f98e08c46a8825d7fddaf9
-
SHA512
1189f17662ee2c5d8d674243653f9a60b8c1de9b1d7df2858b259319454ae5f752610e705736db59002ec3e89a1555db7470a97f508998a0cea5bf225dcb4518
-
SSDEEP
12288:MBimv1yEIkyXwNWYdk7ZfzGi7fT882b5wsIp:iimszfgrdk7ZSi7r920
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db63637db632087b677fc152a0e7b7f7_JaffaCakes118
Files
-
db63637db632087b677fc152a0e7b7f7_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
c0ab941978696bd78a38860e071ce3af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InterlockedExchange
LockResource
FindResourceExW
FlushInstructionCache
GetCurrentProcess
GetCurrentProcessId
TerminateThread
SetEvent
GetCurrentThreadId
SetLastError
SetThreadPriority
GetThreadPriority
GetCurrentThread
CompareFileTime
GetFileTime
CreateEventW
GetSystemDefaultLangID
GetACP
ResetEvent
CopyFileW
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessW
Thread32Next
Thread32First
CreateToolhelp32Snapshot
DuplicateHandle
ReadProcessMemory
OpenThread
LoadLibraryW
InterlockedCompareExchange
SetEnvironmentVariableW
GetEnvironmentVariableW
FatalAppExitA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
ExitProcess
GetModuleHandleA
GetCPInfo
LCMapStringW
LCMapStringA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineA
OpenProcess
TerminateProcess
GetProcAddress
InterlockedExchangeAdd
DeleteFileW
ReleaseMutex
CreateMutexW
WaitForSingleObject
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
FreeLibrary
lstrcmpiW
InterlockedDecrement
InterlockedIncrement
DisableThreadLibraryCalls
ExpandEnvironmentStringsW
FindFirstFileW
FindNextFileW
FindClose
GetFileSize
HeapAlloc
ReadFile
SetFilePointer
WriteFile
SetEndOfFile
CloseHandle
GetLastError
Sleep
CreateFileW
WideCharToMultiByte
lstrcatW
GetProcessHeap
HeapFree
GetVersionExW
GetComputerNameW
lstrlenW
LocalFree
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
CreateThread
ExitThread
RtlUnwind
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapSize
HeapReAlloc
HeapDestroy
EnterCriticalSection
RaiseException
GetSystemDirectoryW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
SetConsoleCtrlHandler
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
GetThreadLocale
GetLocaleInfoA
GetExitCodeThread
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
ReleaseSemaphore
UnmapViewOfFile
MapViewOfFile
GetTimeZoneInformation
SetFileAttributesW
GetTickCount
LocalAlloc
FileTimeToDosDateTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetLocalTime
GetFileInformationByHandle
GlobalAlloc
GlobalFree
lstrlenA
IsBadReadPtr
GlobalReAlloc
GlobalUnlock
GlobalLock
CreateSemaphoreW
lstrcpynW
lstrcpyW
CreateFileA
CreateFileMappingW
lstrcpyA
ProcessIdToSessionId
OpenFileMappingW
GetComputerNameExW
GetFileAttributesW
FindNextFileA
FindFirstFileA
lstrcpynA
GetSystemTime
CreateDirectoryW
GetTempPathW
RemoveDirectoryW
GetTempFileNameW
GetFileAttributesExW
CreateMutexA
Process32NextW
Process32FirstW
GlobalSize
SetFileTime
GetSystemTimeAsFileTime
HeapCreate
user32
MsgWaitForMultipleObjects
CharNextW
IsWindowVisible
GetWindowThreadProcessId
EnumWindows
GetParent
MessageBoxW
CharLowerW
CharLowerBuffW
UnregisterClassA
SetWindowLongW
ShowWindow
IsWindow
GetClassInfoExW
LoadCursorW
DestroyWindow
SendMessageTimeoutW
DefWindowProcW
RegisterClassExW
CreateWindowExW
GetWindowLongW
GetDesktopWindow
PostMessageW
PeekMessageW
TranslateMessage
DispatchMessageW
CallWindowProcW
advapi32
CryptCreateHash
AdjustTokenPrivileges
LookupPrivilegeValueW
InitiateSystemShutdownExW
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
RevertToSelf
OpenThreadToken
ImpersonateLoggedOnUser
CryptEncrypt
CryptAcquireContextW
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegEnumKeyW
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegGetKeySecurity
RegOpenKeyW
RegSetKeySecurity
RegEnumKeyExW
RegQueryValueExW
LookupAccountNameW
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExW
RegCloseKey
CryptDecrypt
CryptDeriveKey
LookupAccountSidW
SetTokenInformation
IsValidSid
SetNamedSecurityInfoW
ConvertStringSidToSidW
CryptDestroyKey
ole32
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
GetHGlobalFromStream
StringFromCLSID
CreateStreamOnHGlobal
oleaut32
VarI4FromStr
SysStringByteLen
SysAllocStringByteLen
VariantClear
VarBstrFromI4
VarUI4FromStr
SysFreeString
SysStringLen
SysAllocString
SysAllocStringLen
CreateErrorInfo
VarBstrCmp
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayRedim
VarBstrCat
VariantChangeType
SafeArrayDestroy
SafeArrayPutElement
SafeArrayGetElement
SystemTimeToVariantTime
SafeArrayCreateVector
SafeArrayCreate
GetErrorInfo
SetErrorInfo
VariantInit
shlwapi
PathRemoveFileSpecW
PathStripPathW
PathAppendW
PathFileExistsW
SHCreateStreamOnFileW
PathSkipRootW
PathMatchSpecW
PathFindFileNameW
PathIsDirectoryA
PathRemoveFileSpecA
PathFindFileNameA
PathAppendA
PathMatchSpecA
PathSkipRootA
PathIsDirectoryW
wtsapi32
WTSOpenServerW
WTSQuerySessionInformationW
WTSCloseServer
WTSFreeMemory
netapi32
NetWkstaUserEnum
NetApiBufferFree
rpcrt4
UuidCreate
RpcStringFreeW
UuidToStringW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetModuleFileNameExW
userenv
CreateEnvironmentBlock
shell32
SHGetFolderPathW
Exports
Exports
DisableDLP
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
EnableDLP
GetCurrentGroupID
GetDLPState
GetFireFoxMonitorState
GetLastUpdatedTimeStamp
Sections
.text Size: 416KB - Virtual size: 414KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFSHARE Size: 4KB - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ