Static task
static1
Behavioral task
behavioral1
Sample
ea57a12b441f72789599a164c7458d5e_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
ea57a12b441f72789599a164c7458d5e_JaffaCakes118
-
Size
53KB
-
MD5
ea57a12b441f72789599a164c7458d5e
-
SHA1
f3e7b674dabbcc9f47873aff36a9f3952ca858d4
-
SHA256
261b29b60699f292d4d3a65f0635bfa5a1929e60404b633ee72fa73ec69a13e1
-
SHA512
8790bc08d0cb103ff72fb9e1aaffd9d3ac08b29fccd757e61f20d6e4c238fa2f65b9c4302eb41c5e9f74c4a4b0f35b320be541d183fa797333055afd06ecffe8
-
SSDEEP
768:JghM0xVR//I5cVIRoYlYbGjZiwRzAgS/heDoVSxZDghUT2K1dyHan:J8VHQvK/sDoVSDEy2YdUan
Malware Config
Signatures
Files
-
ea57a12b441f72789599a164c7458d5e_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
ebdcea0f765312164083c7dceb001837
Code Sign
7d:87:fd:d2:76:85:1d:6b:b9:3e:35:ea:72:5b:98:6aCertificate
IssuerCN=Root AgencyNot Before16/09/2009, 07:50Not After31/12/2039, 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media PlayerSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetProcAddress
lstrcpyA
lstrcatA
GetCurrentThreadId
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
LeaveCriticalSection
DisableThreadLibraryCalls
CreateThread
TerminateThread
CloseHandle
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
GetModuleFileNameA
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
lstrlenA
MultiByteToWideChar
lstrlenW
InitializeCriticalSection
user32
wsprintfA
GetDC
DestroyWindow
PostMessageA
LoadStringA
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
BeginPaint
GetClientRect
EndPaint
CharNextA
ReleaseDC
GetFocus
IsChild
GetClassInfoExA
LoadCursorA
RegisterClassExA
DefWindowProcA
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegSetValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
OleInitialize
oleaut32
SysStringLen
LoadRegTypeLi
DispCallFunc
LoadTypeLi
RegisterTypeLi
SysAllocString
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
SysFreeString
msvcrt
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
_purecall
memcmp
time
atoi
strcpy
_mbsrchr
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
sprintf
strlen
_mbsstr
wcslen
_mbsicmp
__CxxFrameHandler
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
memset
realloc
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
shlwapi
PathFindFileNameA
wininet
InternetGetConnectedState
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gogouuc
setuuc
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ