s:\mmjb\jukebox\mim\DeviceManager\WinMsgObject\Release\WinMsgObject.pdb
Static task
static1
Behavioral task
behavioral1
Sample
54785f6ad12a21e641fedbade2510e66_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
54785f6ad12a21e641fedbade2510e66_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
54785f6ad12a21e641fedbade2510e66_JaffaCakes118
-
Size
96KB
-
MD5
54785f6ad12a21e641fedbade2510e66
-
SHA1
ccf4a4e39f6004b1aefe0ca1a4feccafb4cb9dff
-
SHA256
00499593bfb09881c911984d73cf3f519f029b9445b43e493b5c6a6dbcef5908
-
SHA512
28dbd3dda25ea6fdc46fe7fef8fcf2d93bfbd869b43b6ddb3b2f10c8c3318e75f4eb3c0f2563c86ee4f0e3af6b350e937159d8a9bd4df7e0bed152329257df08
-
SSDEEP
1536:vz449di3b5MeDEzgJQlL3n+t6sGVCmaQoLKGRN17bnGNqt:r49b5MelS3n+t6sAaLKGRrnGkt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54785f6ad12a21e641fedbade2510e66_JaffaCakes118
Files
-
54785f6ad12a21e641fedbade2510e66_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
f54a6dca3098b6c7c63100f1be96a62f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
EnterCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
LocalFree
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetACP
InterlockedIncrement
LeaveCriticalSection
InterlockedDecrement
lstrcpynW
GetModuleFileNameW
GetModuleHandleW
lstrcpyW
GetLocaleInfoA
GetThreadLocale
GetVersionExW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedExchange
GetLastError
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
HeapAlloc
lstrlenW
lstrcmpiW
user32
PostMessageW
SetWindowPos
IsWindow
DestroyWindow
GetDesktopWindow
CallWindowProcW
GetWindowLongW
CharNextW
DefWindowProcW
CreateWindowExW
SetWindowLongW
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
RegDeleteKeyW
shell32
SHGetFileInfoW
ole32
CoCreateInstance
StringFromCLSID
CoTaskMemFree
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
VarUI4FromStr
LoadRegTypeLi
LoadTypeLi
SysStringLen
atl71
ord30
ord31
ord58
ord32
ord15
ord44
ord43
ord65
ord66
ord18
ord22
ord64
ord23
ord61
ord45
msvcp71
?_Nomemory@std@@YAXXZ
msvcr71
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
_callnewh
_resetstkoflw
wcschr
memcmp
realloc
_purecall
memcpy
__CppXcptFilter
_adjust_fdiv
_initterm
memset
free
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
??_V@YAXPAX@Z
malloc
_except_handler3
_vscwprintf
vswprintf
_onexit
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ