winnt32a.pdb
Static task
static1
Behavioral task
behavioral1
Sample
de24cc10565e8bdd41f234b000b54bd2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de24cc10565e8bdd41f234b000b54bd2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
de24cc10565e8bdd41f234b000b54bd2_JaffaCakes118
-
Size
1.2MB
-
MD5
de24cc10565e8bdd41f234b000b54bd2
-
SHA1
cd42c98cbb45b77e5455af45d4e62945af3c904d
-
SHA256
a6039a816c1a933f724a991ebeaab5b77920f267ff5342a2ca61dcbf90e24134
-
SHA512
a1d9c22fd2b60090291de0fe1864d8635db3900307b091f71f8e71761f50123362a5dfbec9269ebf8708585743351a9c2ce37c439c838ef0fe15c851277fb681
-
SSDEEP
24576:o9eRi7YIRS8WFOct92ZeKD0y7F9KUVvN8p8VLz98znNQ:6Ki7YIoGpVV8p8VLz98zne
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de24cc10565e8bdd41f234b000b54bd2_JaffaCakes118
Files
-
de24cc10565e8bdd41f234b000b54bd2_JaffaCakes118.dll windows:5 windows x86 arch:x86
905544c00a0a222983f7114f39be35f8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetFileInformationByHandle
FindNextFileA
TlsSetValue
TlsGetValue
ReleaseMutex
SetEvent
InterlockedDecrement
LeaveCriticalSection
ResetEvent
EnterCriticalSection
CreateThread
CreateEventA
InitializeCriticalSection
WaitForSingleObject
GetExitCodeThread
RemoveDirectoryA
GetTempFileNameA
FileTimeToDosDateTime
TlsFree
TlsAlloc
HeapAlloc
GetProcessHeap
GetSystemTime
GetVersionExA
OpenEventA
GlobalFree
GetOEMCP
GetACP
GlobalMemoryStatus
GetFullPathNameA
GetWindowsDirectoryA
FlushFileBuffers
GetSystemDefaultLCID
WritePrivateProfileSectionA
GetPrivateProfileSectionA
GetSystemDirectoryA
WritePrivateProfileStringA
GlobalAlloc
GetVersion
LockResource
LoadResource
FindResourceA
SetErrorMode
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetNumberFormatA
SystemTimeToFileTime
VirtualFree
VirtualAlloc
SetUnhandledExceptionFilter
LocalFileTimeToFileTime
GetCurrentProcess
DeleteCriticalSection
HeapFree
CreateMutexA
FindResourceExA
SetFileTime
GetPrivateProfileIntA
FlushViewOfFile
OutputDebugStringA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
HeapReAlloc
RtlUnwind
GetFileType
ExitProcess
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
GetCPInfo
LCMapStringA
LCMapStringW
InterlockedExchange
SetEndOfFile
SetStdHandle
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
lstrcmpiA
FormatMessageA
LocalFree
lstrcpynA
ExpandEnvironmentStringsA
lstrcmpA
GetCommandLineA
LocalAlloc
GetLogicalDrives
GetDriveTypeA
GetPrivateProfileStructA
InterlockedIncrement
RaiseException
GetThreadLocale
SetThreadLocale
GetFileTime
OpenProcess
WaitForMultipleObjects
GetSystemInfo
VirtualProtect
VirtualQuery
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleA
SetFilePointer
SetLastError
LoadLibraryA
GetCurrentThread
SetThreadPriority
GetCurrentThreadId
CreateToolhelp32Snapshot
Thread32First
SuspendThread
ResumeThread
Thread32Next
DeviceIoControl
GetTickCount
FindFirstFileA
FindClose
MoveFileA
CreateDirectoryA
GetModuleFileNameA
LoadLibraryExA
GetProcAddress
FreeLibrary
lstrcatA
lstrcpyA
Sleep
GetPrivateProfileStringA
CreateFileA
GetFileSize
GetLastError
CloseHandle
ReadFile
GetFileAttributesA
SetFileAttributesA
CopyFileA
DeleteFileA
lstrlenA
WriteFile
GetDiskFreeSpaceA
GetVolumeInformationA
user32
ExitWindowsEx
CharNextA
GetDesktopWindow
GetWindowRect
RegisterClassExA
CreateWindowExA
DefWindowProcA
GetKeyboardType
WinHelpA
CharPrevA
wsprintfA
CharToOemA
PostMessageA
SystemParametersInfoA
SetWindowPos
MapWindowPoints
DestroyWindow
IsChild
GetDC
ReleaseDC
IsWindow
SetForegroundWindow
IsWindowVisible
IsWindowEnabled
PeekMessageA
GetWindowTextA
LoadCursorA
SetCursor
OemToCharBuffA
SetWindowTextA
IsDlgButtonChecked
GetDlgCtrlID
LoadImageA
KillTimer
SetTimer
GetDlgItemTextA
UpdateWindow
SendDlgItemMessageA
CheckDlgButton
EnableWindow
ShowWindow
SetDlgItemTextA
SetFocus
GetParent
SendMessageA
CharUpperA
CallWindowProcA
DialogBoxIndirectParamA
MoveWindow
SetWindowLongA
GetWindowLongA
GetDlgItem
EndDialog
GetClientRect
GetSystemMetrics
ClientToScreen
SetActiveWindow
GetSystemMenu
EnableMenuItem
CheckRadioButton
ScreenToClient
LoadIconA
InvalidateRect
MessageBoxA
DialogBoxParamA
GetSysColor
GetSysColorBrush
LoadStringA
gdi32
CreateCompatibleDC
SelectObject
SetStretchBltMode
StretchDIBits
DeleteDC
CreateDIBSection
GetStockObject
SetBkMode
SetDIBitsToDevice
ExcludeClipRect
GetDeviceCaps
DeleteObject
CreatePalette
GetObjectA
CreateFontIndirectA
SetBkColor
ole32
CoInitialize
CoCreateInstance
oleaut32
SysAllocStringLen
SysFreeString
advapi32
CryptGenRandom
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptEncrypt
CryptDestroyKey
CryptDestroyHash
CryptReleaseContext
RegCreateKeyExA
IsTextUnicode
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegEnumValueA
RegCreateKeyA
RegOpenKeyA
CryptDecrypt
comctl32
PropertySheetA
ord17
ImageList_Create
ImageList_ReplaceIcon
comdlg32
GetSaveFileNameA
CommDlgExtendedError
GetOpenFileNameA
mpr
WNetGetConnectionA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
imm32
ImmAssociateContext
pidgen
ord5
setupapi
SetupGetStringFieldA
SetupGetMultiSzFieldA
SetupOpenInfFileA
SetupCloseInfFile
SetupFindFirstLineA
SetupFindNextLine
Exports
Exports
UnsupportedArchitectureCheck
winnt32
Sections
.text Size: 272KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 932KB - Virtual size: 929KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ