mpvis.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4adcaa35d619b13d99cb4629b5481e5e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4adcaa35d619b13d99cb4629b5481e5e
-
Size
460KB
-
MD5
4adcaa35d619b13d99cb4629b5481e5e
-
SHA1
94002f5e9a3ae752f273bb27d403818f71ffe534
-
SHA256
7dab2e3be8e715daaebfc98eaaf7b86104a81ceed8b5b4ac67c14ffc9f0cfae0
-
SHA512
6a1193889ffa321721b78c9d0ad800775e5eb84e2a70de132086d7d04c0da590ae2b5fd04c937d99aa14078e7d69ffff30da65f74f64c5346883918bcb6f8378
-
SSDEEP
6144:x/gxI5p8RC6JL0OFLm1I7AV4COHEQeewQeelQeesQeeudQeefQeeZKwQBIoqhvJp:exI5QLM1aw4CIoqhKW+j5oHj4kB9x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4adcaa35d619b13d99cb4629b5481e5e
Files
-
JaffaCakes118_4adcaa35d619b13d99cb4629b5481e5e.dll regsvr32 windows:5 windows x86 arch:x86
4102cf6a6db5437c38be0fb71d34dc3b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LoadResource
FindResourceW
LoadLibraryExW
CloseHandle
WaitForSingleObject
SetEvent
OutputDebugStringW
VirtualFree
FlushInstructionCache
GetCurrentProcess
QueryPerformanceFrequency
QueryPerformanceCounter
InterlockedCompareExchange
LoadLibraryA
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SizeofResource
lstrlenA
lstrcatW
FindResourceA
GetModuleHandleA
GetVersionExA
IsProcessorFeaturePresent
LockResource
DisableThreadLibraryCalls
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleFileNameW
lstrcpynW
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
lstrcmpiW
InterlockedDecrement
HeapAlloc
GetProcessHeap
HeapFree
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrcpyW
lstrlenW
MultiByteToWideChar
VirtualQuery
GetSystemInfo
VirtualAlloc
Sleep
DelayLoadFailureHook
VirtualProtect
GetVersionExW
msvcrt
??3@YAXPAX@Z
sprintf
exit
calloc
?terminate@@YAXXZ
_except_handler3
_adjust_fdiv
_initterm
rand
time
srand
_ftol
_wcsicmp
_purecall
??2@YAPAXI@Z
realloc
free
malloc
wcspbrk
wcschr
_vsnwprintf
_CIacos
_finite
__CxxFrameHandler
longjmp
_setjmp3
isdigit
isspace
_CIpow
floor
advapi32
RegQueryValueExA
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyA
ole32
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
oleaut32
SysAllocStringLen
LoadRegTypeLi
VarUI4FromStr
SysStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
user32
SetWindowLongW
GetWindowLongW
CallWindowProcW
CallNextHookEx
GetAsyncKeyState
DestroyWindow
UnhookWindowsHookEx
UpdateWindow
ShowWindow
SetWindowsHookExW
IsWindowUnicode
CreateWindowExW
RegisterClassW
LoadCursorW
DefWindowProcW
PostMessageW
SetCursor
CopyRect
SetRectEmpty
IsRectEmpty
GetSystemMetrics
GetDC
FillRect
IsWindow
ReleaseDC
MonitorFromWindow
GetWindowRect
GetClientRect
CharNextW
CharPrevW
gdi32
DeleteObject
SetStretchBltMode
TextOutW
SetTextAlign
SetTextColor
SetBkColor
StretchBlt
GetStockObject
winmm
timeGetTime
timeBeginPeriod
timeEndPeriod
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 268KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE