pxtabx
Static task
static1
Behavioral task
behavioral1
Sample
14d2b873f3ff12188a7259439fa52928_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14d2b873f3ff12188a7259439fa52928_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
14d2b873f3ff12188a7259439fa52928_JaffaCakes118
-
Size
32KB
-
MD5
14d2b873f3ff12188a7259439fa52928
-
SHA1
b3563ad052b44ba95aaf3f63941debf5e4fb261e
-
SHA256
a1125940e7c32c63aee537449b99963aaf605a1865a68cb86c4d51dbc4af8474
-
SHA512
45e34755ce2daeb23ace4098f2c403dd58159ed20519bfb908483f0416b9c81b597875b8910a23ce833004139dc9a0be989fb54ad35b520b6942bfa09da944c3
-
SSDEEP
384:XFbrX7B6Ile1y6USgm8a31XaU3WpCbzX+J2WElo0gPALKgkG2SD2BV7:VF3Q1Fka913fbq2WQgwvn+5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14d2b873f3ff12188a7259439fa52928_JaffaCakes118
Files
-
14d2b873f3ff12188a7259439fa52928_JaffaCakes118.dll windows:6 windows x86 arch:x86
03dbab2608ca118ecbdf9058bc91f63e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
imm32
ImmGetCompositionStringA
ImmUnlockIMCC
ImmGetOpenStatus
ImmGetHotKey
ImmRequestMessageW
ImmReSizeIMCC
ImmIsIME
ImmReleaseContext
ImmGetDefaultIMEWnd
ImmIsUIMessageW
ImmSimulateHotKey
kernel32
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualProtect
FreeLibrary
GetProcAddress
CloseHandle
lstrcmpW
lstrcpyA
lstrcpyW
lstrlenA
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
GetLastError
RemoveDirectoryA
PostQueuedCompletionStatus
LoadLibraryW
IsDBCSLeadByteEx
CreateWaitableTimerW
SetThreadIdealProcessor
ExpandEnvironmentStringsW
CreateFileW
GetDriveTypeA
GetDriveTypeW
winmm
mixerClose
midiOutGetErrorTextA
timeKillEvent
waveOutGetID
timeGetDevCaps
wsnmp32
ord903
ord500
ord503
ord400
ord902
loadperf
LoadPerfCounterTextStringsA
LoadPerfCounterTextStringsW
UnloadPerfCounterTextStringsW
UnloadPerfCounterTextStringsA
oleaut32
VarBoolFromUI1
SystemTimeToVariantTime
VarR8Round
SafeArrayDestroyData
VarBstrFromI1
VarUI2FromDisp
VarUI4FromI4
VarNumFromParseNum
VarI2FromStr
VarI2FromR8
ws2_32
WSASocketA
WSALookupServiceNextA
WSAResetEvent
shutdown
WSAAccept
WSCDeinstallProvider
user32
LoadStringW
advapi32
GetUserNameA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenCurrentUser
RegCloseKey
GetUserNameW
msvcrt
iswctype
wcschr
swprintf
memcpy
memset
free
_initterm
_adjust_fdiv
malloc
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ