obemetal.pdb
Static task
static1
Behavioral task
behavioral1
Sample
03b7ec0036fa0f55a3ad8f384ae7e789_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
03b7ec0036fa0f55a3ad8f384ae7e789_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
03b7ec0036fa0f55a3ad8f384ae7e789_JaffaCakes118
-
Size
944KB
-
MD5
03b7ec0036fa0f55a3ad8f384ae7e789
-
SHA1
2b0966f56b96295d6c713726300a6a799d2d012b
-
SHA256
b7bea6881a04af4ad606f095055fbfc91afd5c0e42be964bd0265f5e1c86c178
-
SHA512
56a8d57f9e5003e3cfbfe3f94bb9686d8ff390453816780d9527b30c6d9e0f25371abd3da836b78149d6e7768e66cd408723fa3acd30264f4e6076023cb9d5e3
-
SSDEEP
12288:tNZG5+zzMcssIUkV8/EiSbPQPY0zRwZWl8/ElERXpLsJTvrbgKEIeYY62BDT9WO:tNHDssXka/yPQPYlYfeZebgKEIeqmvf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03b7ec0036fa0f55a3ad8f384ae7e789_JaffaCakes118
Files
-
03b7ec0036fa0f55a3ad8f384ae7e789_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
f1b88c1678c1d10d0d7781cdbe373997
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
shlwapi
StrDupA
PathAddExtensionW
StrFormatByteSizeW
StrCmpNIA
StrPBrkW
PathCombineA
SHDeleteKeyA
StrRChrA
StrStrA
ChrCmpIW
SHGetValueA
SHSetValueA
StrCmpNW
ord265
ord263
SHRegGetBoolUSValueW
UrlCreateFromPathW
SHDeleteKeyW
UrlHashW
UrlCombineW
StrStrIW
StrChrIW
ord462
PathStripPathA
SHCreateShellPalette
SHGetInverseCMAP
SHRegGetUSValueW
StrCatBuffA
PathAddBackslashA
SHStrDupW
PathIsRelativeW
wvnsprintfA
StrCpyW
StrChrA
PathIsUNCA
StrCmpW
SHEnumKeyExW
SHRegOpenUSKeyW
SHRegDeleteUSValueW
SHRegCloseUSKey
ord389
PathIsDirectoryW
SHCopyKeyW
StrToIntA
StrCSpnW
StrDupW
StrChrW
PathRemoveExtensionW
PathAddBackslashW
HashData
StrTrimW
StrRStrIW
SHDeleteValueW
SHSetValueW
PathGetDriveNumberW
SHGetValueW
PathFindExtensionW
PathIsURLW
StrStrW
StrCmpNIW
SHCreateStreamOnFileW
PathAppendW
PathRemoveFileSpecW
StrRChrW
StrNCatW
PathFileExistsW
StrCatBuffW
PathCombineW
PathAppendA
PathRemoveFileSpecA
wnsprintfA
PathFindFileNameA
StrToIntW
PathFindFileNameW
UrlGetPartW
StrCmpIW
wnsprintfW
StrCpyNW
StrCmpNA
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegSetValueA
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenThreadToken
LogonUserW
LookupAccountNameW
RegLoadKeyW
RegUnLoadKeyW
CryptDecrypt
CryptDestroyKey
CryptDeriveKey
RegEnumValueW
RegEnumValueA
RegSetValueExW
RegSetValueW
RegQueryValueExW
RegQueryValueExA
RegQueryValueW
RegQueryValueA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyA
RegEnumKeyExW
RegEnumKeyExA
RegEnumKeyW
RegEnumKeyA
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyW
RegSetValueExA
RegCreateKeyExW
RegCreateKeyW
RegCreateKeyA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegOpenKeyExA
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessDeniedAce
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
GetAce
RegCloseKey
user32
DispatchMessageA
GetForegroundWindow
GetClientRect
MapWindowPoints
InvalidateRect
ShowWindow
GetParent
SetTimer
KillTimer
GetDlgItem
EndDialog
DestroyWindow
MoveWindow
GetDC
ReleaseDC
SetFocus
IsWindow
GetWindowTextA
SetCursor
CreatePopupMenu
GetKeyState
SetWindowPos
GetMessageTime
ReleaseCapture
SetCapture
SendMessageTimeoutW
SendDlgItemMessageW
FindWindowW
RegisterClassExW
RegisterClassExA
SetMenuItemInfoW
SetMenuItemInfoA
DrawTextExW
DrawTextExA
WinHelpW
WinHelpA
UnregisterClassW
SystemParametersInfoW
SetWindowTextW
SetWindowTextA
SetPropW
SetPropA
SendMessageW
SendMessageA
SendMessageTimeoutA
RemovePropW
RemovePropA
RegisterWindowMessageW
RegisterClassW
RegisterClassA
MessageBoxIndirectW
MessageBoxIndirectA
InsertMenuW
LoadImageW
GetWindowTextW
GetPropW
GetPropA
MessageBoxW
MessageBoxA
GetClassNameW
GetClassNameA
GetClassInfoW
GetClassInfoA
FindWindowExW
DrawTextW
CreateWindowExW
CreateWindowExA
CharUpperW
CharLowerW
GetMenuItemInfoW
GetMenuItemInfoA
TranslateAcceleratorW
TranslateAcceleratorA
SetWindowsHookExW
SetWindowsHookExA
SetWindowLongW
SetWindowLongA
CharNextA
PostThreadMessageW
PostThreadMessageA
PostMessageW
PostMessageA
PeekMessageW
PeekMessageA
LoadStringW
TrackPopupMenuEx
LoadMenuW
LoadMenuA
DestroyMenu
DeleteMenu
LookupIconIdFromDirectoryEx
CreateIconFromResourceEx
CreateIconFromResource
LoadIconW
LoadCursorW
LoadAcceleratorsW
LoadAcceleratorsA
IsDialogMessageW
IsDialogMessageA
GetWindowTextLengthW
GetWindowTextLengthA
GetWindowLongW
GetWindowLongA
GetMessageW
GetMessageA
DispatchMessageW
UnregisterClassA
DialogBoxParamW
DialogBoxParamA
DefWindowProcW
DefWindowProcA
CreateDialogParamW
CreateDialogParamA
CopyAcceleratorTableW
CopyAcceleratorTableA
CharUpperBuffW
CharLowerBuffW
CallWindowProcW
CallWindowProcA
IntersectRect
GetMenu
IsMenu
DrawTextA
CloseClipboard
GetClipboardData
OpenClipboard
CheckRadioButton
FindWindowExA
LoadIconA
LoadImageA
LoadCursorA
CallNextHookEx
UnhookWindowsHookEx
CopyRect
SetWindowRgn
SetMenuDefaultItem
SetParent
GetWindowThreadProcessId
InsertMenuA
AppendMenuA
RemoveMenu
GetSubMenu
ModifyMenuA
GetSystemMetrics
DrawIconEx
GetMenuState
GetMenuItemCount
MessageBeep
EnableMenuItem
MsgWaitForMultipleObjects
PostQuitMessage
FrameRect
GetSysColorBrush
SetRect
GetDialogBaseUnits
EndPaint
BeginPaint
ScreenToClient
GetNextDlgTabItem
RegisterWindowMessageA
IsDlgButtonChecked
SetWindowPlacement
BringWindowToTop
SetCursorPos
GetCursorPos
GetDesktopWindow
SetForegroundWindow
GetActiveWindow
EqualRect
InflateRect
SystemParametersInfoA
DestroyIcon
CheckMenuItem
IsChild
GetTopWindow
RedrawWindow
GetDCEx
GetWindowDC
GetWindowPlacement
IsZoomed
IsIconic
GetSystemMenu
GetLastActivePopup
IsWindowEnabled
GetSysColor
EnumChildWindows
DdeUninitialize
DdeFreeStringHandle
DdeNameService
DdeCreateStringHandleA
DdeInitializeA
DdeGetData
DdeQueryStringA
DdeGetLastError
DdeCreateDataHandle
WaitMessage
TranslateMessage
GetFocus
GetWindow
FillRect
EnableWindow
IsWindowVisible
ClientToScreen
PtInRect
OffsetRect
UpdateWindow
GetWindowRect
ole32
CoTaskMemFree
StringFromGUID2
CoLoadLibrary
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
StringFromCLSID
CreateBindCtx
OleInitialize
OleUninitialize
CoInitialize
CoUninitialize
CoTaskMemRealloc
CLSIDFromProgID
CreateStreamOnHGlobal
OleLockRunning
GetHGlobalFromStream
OleLoadFromStream
WriteClassStm
OleSaveToStream
oleaut32
LoadRegTypeLi
VariantChangeTypeEx
LoadTypeLi
SystemTimeToVariantTime
SysReAllocStringLen
SysReAllocString
SysAllocStringByteLen
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreate
VariantCopy
VariantTimeToSystemTime
SafeArrayGetElement
VariantInit
SysAllocStringLen
SysStringByteLen
VariantChangeType
SysAllocString
VariantClear
SysFreeString
SysStringLen
gdi32
ExtTextOutA
ExtSelectClipRgn
IntersectClipRect
GetTextAlign
CreateRectRgn
CreatePen
MoveToEx
SetTextAlign
GetTextExtentPointW
GetViewportExtEx
GetWindowExtEx
GetTextExtentPointA
GetTextCharsetInfo
TranslateCharsetInfo
GetCurrentObject
GetCharWidthW
CreateSolidBrush
CreateDIBSection
GetDIBits
GetDIBColorTable
SetDIBColorTable
GetNearestPaletteIndex
CreateFontW
CreateFontA
GetTextExtentPoint32W
ExtTextOutW
SetViewportOrgEx
DeleteObject
SetTextColor
SetBkMode
SelectObject
GetDeviceCaps
StretchBlt
GetStockObject
CreateCompatibleDC
SelectPalette
RealizePalette
BitBlt
DeleteDC
CreateCompatibleBitmap
PatBlt
SetStretchBltMode
GetViewportOrgEx
GdiFlush
CreatePolygonRgn
Polygon
GetTextColor
SetBkColor
SaveDC
RestoreDC
CreateFontIndirectA
GetTextExtentPoint32A
GetPaletteEntries
CreateFontIndirectW
GetObjectA
GetObjectW
GetTextMetricsA
GetTextMetricsW
GetClipRgn
GetCharWidthA
kernel32
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
DebugBreak
RtlUnwind
GetComputerNameW
GlobalUnlock
VirtualFree
VirtualAlloc
SetFileTime
TerminateProcess
ExitProcess
RaiseException
FlushInstructionCache
VirtualProtect
IsValidCodePage
GetExitCodeProcess
GetAtomNameA
FlushFileBuffers
GetProcessTimes
GetVersionExW
IsDBCSLeadByte
GetDateFormatW
GetDateFormatA
GetTimeFormatW
GetTimeFormatA
SetErrorMode
CreateProcessW
CreateProcessA
GetPrivateProfileStringW
WritePrivateProfileStringW
WritePrivateProfileStringA
LoadLibraryW
CreateSemaphoreW
CreateSemaphoreA
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
CreateMutexW
CreateMutexA
SetCurrentDirectoryW
SetCurrentDirectoryA
RemoveDirectoryW
RemoveDirectoryA
OutputDebugStringW
OutputDebugStringA
OpenEventW
OpenEventA
MoveFileW
MoveFileA
CopyFileW
CopyFileA
CompareStringW
CompareStringA
LoadLibraryExW
LoadLibraryExA
GetWindowsDirectoryW
GetWindowsDirectoryA
GetTempPathW
GetTempPathA
GetTempFileNameW
GetTempFileNameA
GetPrivateProfileIntW
GetFullPathNameW
GetFullPathNameA
SetFileAttributesW
SetFileAttributesA
GetModuleHandleW
SearchPathW
SearchPathA
GetSystemDirectoryW
GetSystemDirectoryA
GetModuleFileNameW
GetLocaleInfoW
GetLocaleInfoA
GetFileAttributesW
FormatMessageW
FormatMessageA
FindResourceW
FindFirstFileW
FindFirstFileA
DeleteFileW
DeleteFileA
CreateFileW
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CreateDirectoryA
IsBadStringPtrW
FindResourceA
LockResource
FindNextFileW
FindNextFileA
FlushViewOfFile
SetFilePointer
SetEndOfFile
MapViewOfFile
UnmapViewOfFile
GetUserDefaultLangID
GetACP
ReadFile
WriteFile
GetCurrentThread
QueryPerformanceFrequency
QueryPerformanceCounter
GetThreadPriority
Sleep
CreateFileMappingW
CreateFileMappingA
GetFileAttributesA
SystemTimeToFileTime
SetLastError
FileTimeToSystemTime
GetDiskFreeSpaceA
WaitForMultipleObjects
GlobalDeleteAtom
GlobalAddAtomA
GlobalFree
GlobalLock
GlobalReAlloc
GlobalAlloc
LocalLock
ReleaseSemaphore
TerminateThread
SetThreadPriority
CreateThread
MulDiv
GetTimeZoneInformation
GetSystemDefaultLCID
GetDriveTypeA
GetLogicalDrives
GlobalMemoryStatus
GetSystemInfo
DisableThreadLibraryCalls
TlsFree
TlsAlloc
GetUserDefaultLCID
FreeResource
SizeofResource
LoadResource
ResetEvent
OpenProcess
CreateToolhelp32Snapshot
GetCurrentProcessId
GetStartupInfoA
GetSystemTime
CompareFileTime
DeleteCriticalSection
InitializeCriticalSection
GetLocalTime
GetModuleHandleA
lstrcmpiA
GetCurrentThreadId
IsBadCodePtr
IsBadReadPtr
GetPrivateProfileStringA
FindClose
GetFileTime
GetSystemTimeAsFileTime
GetCurrentProcess
FileTimeToLocalFileTime
lstrcmpA
GetFileSize
LoadLibraryA
GetVersionExA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
GetPrivateProfileIntA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
lstrcpynA
GetModuleFileNameA
SetEvent
CloseHandle
InterlockedExchange
WaitForSingleObject
GetTickCount
TlsGetValue
TlsSetValue
GetLastError
IsBadWritePtr
LocalReAlloc
LocalAlloc
LocalFree
FreeLibrary
GetProcAddress
lstrlenW
LeaveCriticalSection
SetUnhandledExceptionFilter
comctl32
PropertySheetW
InitCommonControlsEx
_TrackMouseEvent
imm32
ImmAssociateContext
crypt32
CryptDecodeObject
CryptMsgGetParam
Exports
Exports
?Cleanup@CMarsSignin@@SGXXZ
?ConfigLogonMgrForPoptimize@CSignupConfig@@SGJPAUILogonManager@@@Z
?ConfigLogonMgrForSignup@CSignupConfig@@SGJPAUILogonManager@@@Z
?CreateNewUser@CUserManager@@QAEJPBG0HPAPAVCUser@@@Z
?FindUser@CUserManager@@QAEJPBGPAPAVCUser@@@Z
?GetInstance@CUserManager@@SGJPAPAV1@@Z
?GetLogonManager@CMarsSignin@@SGJPAPAUILogonManager@@@Z
?GetLogonWindow@CApplication@@QAEXPAPAVCLogonWindow@@@Z
?GetMarsWindow@CApplication@@QAEXPAPAVCMarsWindow@@@Z
?Initialize@CMarsSignin@@SGJPAX@Z
?LogIn@CLogonWindow@@QAEJPBG0HH@Z
?Login@CUserManager@@QAEJPAVCUser@@H@Z
?MigrateTapiSettings@CSignupConfig@@SGJPAUIModem@@@Z
?Search@CSearchInput@@QAEJXZ
?SetDelayLoadHook@@YGXP6GP6GHXZIPAUDelayLoadInfo@@@Z@Z
?SetInputText@CSearchInput@@QAEXPBG@Z
?ShowDialog@CMsgBox@@SGHJPBG0KPAG1@Z
?ShowDialog@CMsgBox@@SGHPAUHWND__@@JPBG1KPAG21111J@Z
?ShowSigninError@CMarsSignin@@SGHJPAG0K@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
_DoPrivacyDlg@16
Sections
.text Size: 816KB - Virtual size: 813KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE