Static task
static1
Behavioral task
behavioral1
Sample
ebd080a3f47d7f06108774c0cc2d010d_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
ebd080a3f47d7f06108774c0cc2d010d_JaffaCakes118
-
Size
79KB
-
MD5
ebd080a3f47d7f06108774c0cc2d010d
-
SHA1
708c3c713db050da27cdd45467a934cb31396c50
-
SHA256
0110c96d2d6ec5ef4ed08b7905b9a672cb9a182b6cfedf999fce3d3ae7c9633d
-
SHA512
6af6b02912c9e3e8c962c4d52280d7d99cdd56034056ea51f8983b25c37b7535f2a32cbe82417250bbfb6bd63a291fb3b6728e6df9972b0f61d143f3bf1c6ba2
-
SSDEEP
1536:tU7vuQNEvUFG1B3+P2yzKpICYJUqH6pHl6ZrQ:tCmQv4XuKvYJ5HEF6Zc
Malware Config
Signatures
Files
-
ebd080a3f47d7f06108774c0cc2d010d_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
39a4cd00dfb7aadf90fca7384e9215ef
Code Sign
3a:aa:24:d3:a7:9a:11:59:bd:5f:49:42:5d:b9:47:f4Certificate
IssuerCN=Root AgencyNot Before22/06/2009, 06:42Not After31/12/2039, 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media Player38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateThread
GetSystemTime
TerminateThread
DisableThreadLibraryCalls
GetCurrentThreadId
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
CreateFileA
lstrcatA
GetProcAddress
FlushInstructionCache
GetCurrentProcess
DebugBreak
OutputDebugStringA
OpenProcess
GetFileSize
ReadFile
lstrlenW
CloseHandle
LoadLibraryA
FreeLibrary
GetVersionExA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
lstrcpyA
user32
wsprintfA
CharNextA
FindWindowA
DestroyWindow
DefWindowProcA
IsChild
GetFocus
EndPaint
PostMessageA
wvsprintfA
CallWindowProcA
GetWindowLongA
SetWindowLongA
LoadStringA
GetDC
ReleaseDC
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
BeginPaint
GetClientRect
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
oleaut32
SysFreeString
DispCallFunc
LoadRegTypeLi
SysStringLen
SysAllocString
LoadTypeLi
RegisterTypeLi
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
urlmon
URLDownloadToFileA
msvcrt
_adjust_fdiv
_initterm
_onexit
__dllonexit
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
_strcmpi
_ismbcdigit
wcslen
_purecall
_mbsicmp
_mbsrchr
_ismbcspace
srand
rand
_mbsstr
atoi
realloc
time
sprintf
_except_handler3
malloc
free
??3@YAXPAX@Z
??2@YAPAXI@Z
memmove
__CxxFrameHandler
shlwapi
PathFindFileNameA
PathFileExistsA
wininet
DeleteUrlCacheEntry
InternetGetConnectedState
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ