Static task
static1
Behavioral task
behavioral1
Sample
e740a48145695ae210ca2736b34e37c9_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e740a48145695ae210ca2736b34e37c9_JaffaCakes118.dll
Resource
win10v2004-20231215-en
General
-
Target
e740a48145695ae210ca2736b34e37c9_JaffaCakes118
-
Size
24KB
-
MD5
e740a48145695ae210ca2736b34e37c9
-
SHA1
04a35631e7972591ff17cbaaaeee74ab21878cd8
-
SHA256
98b573964d81e60ff87d385f0cb17f80573ee88d196282bdde23362dbd1fb922
-
SHA512
3c62bb49681d30db2487cdc1775f8b6a85848747c76660ef766b9c8c3da036f82741c3370e227645b20cff2c3b8ef6c76421c5dac4ee5ff210efbadf61a4519e
-
SSDEEP
384:ZftBxNq4dDb+jzIED8AHr3xjlbAtRsZsTTof78:htB7BdDi3IEYY3x5bAM2T6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e740a48145695ae210ca2736b34e37c9_JaffaCakes118
Files
-
e740a48145695ae210ca2736b34e37c9_JaffaCakes118.dll windows:5 windows x64 arch:x64
d467cfd933bf9a84e6cd3a94642b37cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
GetProcAddress
Process32Next
GetModuleHandleA
CreateToolhelp32Snapshot
GetSystemDirectoryA
CreateThread
TerminateProcess
GetExitCodeProcess
HeapAlloc
OpenProcess
GetSystemWow64DirectoryA
WaitForSingleObject
Process32First
CloseHandle
CreateMutexA
Sleep
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapFree
ReleaseMutex
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
advapi32
CloseServiceHandle
OpenServiceA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
ControlService
OpenSCManagerA
RegOpenKeyExA
StartServiceA
RegCloseKey
shell32
ShellExecuteA
iphlpapi
GetIpForwardTable
ws2_32
connect
inet_addr
WSASend
WSAGetLastError
htons
recv
WSAGetOverlappedResult
WSACloseEvent
closesocket
WSAResetEvent
WSASocketA
WSAWaitForMultipleEvents
inet_ntoa
WSAStartup
WSACleanup
WSACreateEvent
setsockopt
msvcr90
memset
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
__crt_debugger_hook
sprintf
strcpy_s
strncpy
rand
srand
_time64
atoi
_encode_pointer
_malloc_crt
_initterm
_initterm_e
free
_encoded_null
_decode_pointer
_amsg_exit
__C_specific_handler
__CppXcptFilter
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 540B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ