Static task
static1
Behavioral task
behavioral1
Sample
40d89f8bd5f8608bc36350109b398563_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
40d89f8bd5f8608bc36350109b398563_JaffaCakes118
-
Size
53KB
-
MD5
40d89f8bd5f8608bc36350109b398563
-
SHA1
d5dfa004f8ad44f9d2b0f597eb85f4870ab7c3c6
-
SHA256
6d9012837f3d071cd7460f3e705221595be9b9775dea2486333258bbcd6d7c8f
-
SHA512
d74e595e4dd54c431a1f39d6649308380067350105d4128eae2117ad9917f0846509e657e630696bb7c0a7cfb980513eac58c3a73e4efda1541b4deee182927b
-
SSDEEP
768:ZhM0xVR//I5cVIRkYlYbGjZiwRzAgS/heDoVyxZDghCTJb1dyHZP:zVHQ7K/sDoVyDE4J5dUZP
Malware Config
Signatures
Files
-
40d89f8bd5f8608bc36350109b398563_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
ebdcea0f765312164083c7dceb001837
Code Sign
7d:87:fd:d2:76:85:1d:6b:b9:3e:35:ea:72:5b:98:6aCertificate
IssuerCN=Root AgencyNot Before16/09/2009, 07:50Not After31/12/2039, 23:59SubjectCN=Microsoft(R) Windows Media Player,O=Microsoft(R) Windows Media PlayerSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetProcAddress
lstrcpyA
lstrcatA
GetCurrentThreadId
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
LeaveCriticalSection
DisableThreadLibraryCalls
CreateThread
TerminateThread
CloseHandle
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
GetModuleFileNameA
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
lstrlenA
MultiByteToWideChar
lstrlenW
InitializeCriticalSection
user32
wsprintfA
GetDC
DestroyWindow
PostMessageA
LoadStringA
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
BeginPaint
GetClientRect
EndPaint
CharNextA
ReleaseDC
GetFocus
IsChild
GetClassInfoExA
LoadCursorA
RegisterClassExA
DefWindowProcA
gdi32
LPtoDP
SaveDC
CreateDCA
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
GetDeviceCaps
RestoreDC
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegSetValueExA
ole32
CoInitialize
CoCreateInstance
CoGetMalloc
StringFromIID
OleInitialize
oleaut32
SysStringLen
LoadRegTypeLi
DispCallFunc
LoadTypeLi
RegisterTypeLi
SysAllocString
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
VariantClear
SafeArrayGetDim
SafeArrayGetElemsize
SysFreeString
msvcrt
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
_purecall
memcmp
time
atoi
strcpy
_mbsrchr
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbicmp
sprintf
strlen
_mbsstr
wcslen
_mbsicmp
__CxxFrameHandler
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
memset
realloc
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
shlwapi
PathFindFileNameA
wininet
InternetGetConnectedState
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gogouuc
setuuc
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ