mpvis.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
e2f02a20ec56eef85cd857502f7c4606_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
e2f02a20ec56eef85cd857502f7c4606_JaffaCakes118
-
Size
460KB
-
MD5
e2f02a20ec56eef85cd857502f7c4606
-
SHA1
9e95aa94451b0209716580d37f08d557befd0c19
-
SHA256
a22c5fcc9b2138f9a49ea73ac52678e9ad3edd4b92702b87cea992d005b40dbe
-
SHA512
c47acf9d65334a08efb1c32f69be1b3bb1eb7de020748cacff487b049b9e42615ab1c1d027d2b7323f139f8563ada78f2d656f8f8a58c783dcf8e0c0af83fd60
-
SSDEEP
6144:5/gxI5p8RC6JL0OFLm1I7AV4COHEQeewQeelQeesQeeudQeefQeeZKwQBIoqhvJc:GxI5QLM1aw4CIoqhKWy50tSd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2f02a20ec56eef85cd857502f7c4606_JaffaCakes118
Files
-
e2f02a20ec56eef85cd857502f7c4606_JaffaCakes118.dll regsvr32 windows:5 windows x86 arch:x86
4102cf6a6db5437c38be0fb71d34dc3b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LoadResource
FindResourceW
LoadLibraryExW
CloseHandle
WaitForSingleObject
SetEvent
OutputDebugStringW
VirtualFree
FlushInstructionCache
GetCurrentProcess
QueryPerformanceFrequency
QueryPerformanceCounter
InterlockedCompareExchange
LoadLibraryA
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SizeofResource
lstrlenA
lstrcatW
FindResourceA
GetModuleHandleA
GetVersionExA
IsProcessorFeaturePresent
LockResource
DisableThreadLibraryCalls
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleFileNameW
lstrcpynW
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
lstrcmpiW
InterlockedDecrement
HeapAlloc
GetProcessHeap
HeapFree
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrcpyW
lstrlenW
MultiByteToWideChar
VirtualQuery
GetSystemInfo
VirtualAlloc
Sleep
DelayLoadFailureHook
VirtualProtect
GetVersionExW
msvcrt
??3@YAXPAX@Z
sprintf
exit
calloc
?terminate@@YAXXZ
_except_handler3
_adjust_fdiv
_initterm
rand
time
srand
_ftol
_wcsicmp
_purecall
??2@YAPAXI@Z
realloc
free
malloc
wcspbrk
wcschr
_vsnwprintf
_CIacos
_finite
__CxxFrameHandler
longjmp
_setjmp3
isdigit
isspace
_CIpow
floor
advapi32
RegQueryValueExA
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyA
ole32
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
oleaut32
SysAllocStringLen
LoadRegTypeLi
VarUI4FromStr
SysStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
user32
SetWindowLongW
GetWindowLongW
CallWindowProcW
CallNextHookEx
GetAsyncKeyState
DestroyWindow
UnhookWindowsHookEx
UpdateWindow
ShowWindow
SetWindowsHookExW
IsWindowUnicode
CreateWindowExW
RegisterClassW
LoadCursorW
DefWindowProcW
PostMessageW
SetCursor
CopyRect
SetRectEmpty
IsRectEmpty
GetSystemMetrics
GetDC
FillRect
IsWindow
ReleaseDC
MonitorFromWindow
GetWindowRect
GetClientRect
CharNextW
CharPrevW
gdi32
DeleteObject
SetStretchBltMode
TextOutW
SetTextAlign
SetTextColor
SetBkColor
StretchBlt
GetStockObject
winmm
timeGetTime
timeBeginPeriod
timeEndPeriod
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 268KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE