e:\JinZQ\技术研究\WebBrowser技术研究\WebDll-Project\WebDllx\Release\WebDllx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c79a616f838d0d3ea99bf5b537e2903_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c79a616f838d0d3ea99bf5b537e2903_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3c79a616f838d0d3ea99bf5b537e2903_JaffaCakes118
-
Size
148KB
-
MD5
3c79a616f838d0d3ea99bf5b537e2903
-
SHA1
8f11e14e89b23bed53f8adfbc2badcb944ee2513
-
SHA256
fe072a62d4053f7115234f4b66415bc4e843eab22460769388fb203bf215718b
-
SHA512
e458ed3707ff91f7933bc4729cfd8be6d52b2d3271b11858808d764c12fd5d019166582f0b9f7c0b96777af69d12947d6e75f328ce7b42913e17cebd3254c5f8
-
SSDEEP
3072:1KY2vGKCaPfqsL0kVjyUkOEY+tSqm41B09LDQ1oYFSw:0Yglvv0YeUk6qmaBN19U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c79a616f838d0d3ea99bf5b537e2903_JaffaCakes118
Files
-
3c79a616f838d0d3ea99bf5b537e2903_JaffaCakes118.dll windows:4 windows x86 arch:x86
ddee2c79b231ad1781334e9fba03b025
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mfc71
ord1098
ord371
ord1175
ord1084
ord293
ord577
ord266
ord265
ord1917
ord1187
ord1191
ord762
ord764
msvcr71
malloc
free
_resetstkoflw
_except_handler3
_vscwprintf
vswprintf
wcslen
strstr
sprintf
__CppXcptFilter
_adjust_fdiv
_initterm
_onexit
_open
_lseek
_close
_write
_stricmp
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
memset
printf
strncpy
realloc
srand
rand
_access
isspace
strchr
strpbrk
time
atoi
_CxxThrowException
memmove
_snprintf
__CxxFrameHandler
kernel32
HeapReAlloc
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
ExitProcess
LocalFree
LoadLibraryA
CreateThread
GetCurrentThreadId
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FreeLibrary
GetModuleHandleA
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
GetCurrentProcess
FlushInstructionCache
MulDiv
InterlockedDecrement
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteFileA
GetWindowsDirectoryA
CreateProcessA
GetProcessId
Thread32First
Thread32Next
GetModuleFileNameA
WritePrivateProfileStringA
GetTickCount
OutputDebugStringW
HeapSize
OpenProcess
GetPriorityClass
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
Sleep
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
lstrlenA
lstrlenW
lstrcmpiA
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
RegisterClassA
LoadIconA
MessageBoxA
PeekMessageA
GetWindow
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
InvalidateRgn
PostQuitMessage
ReleaseDC
GetDC
SetWindowTextA
FillRect
SetCapture
ReleaseCapture
GetSysColor
DefWindowProcA
CreateWindowExA
SetWindowLongA
SetWindowsHookExA
CallNextHookEx
IsWindow
GetWindowLongA
UnregisterClassA
RegisterWindowMessageA
GetWindowTextLengthA
InvalidateRect
GetWindowTextA
SendMessageA
ShowWindow
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
SetWindowPos
DestroyWindow
RedrawWindow
DestroyAcceleratorTable
GetDlgItem
SetFocus
GetFocus
GetClientRect
IsChild
UnhookWindowsHookEx
gdi32
DeleteObject
SelectObject
DeleteDC
CreateSolidBrush
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
shlwapi
PathFileExistsA
ole32
OleUninitialize
OleInitialize
CoTaskMemRealloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoInitialize
CoCreateInstance
CoTaskMemFree
oleaut32
SysStringByteLen
SysAllocString
SysAllocStringLen
VariantInit
VariantChangeType
VariantCopy
VariantClear
SysFreeString
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
SysStringLen
Exports
Exports
?process4@@YAHH@Z
EngineProc
process1
process2
process3
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HookData Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ