wmiobjNetM
Static task
static1
Behavioral task
behavioral1
Sample
e9067f7bbeec4261dc4e3d84e937d96a_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e9067f7bbeec4261dc4e3d84e937d96a_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
e9067f7bbeec4261dc4e3d84e937d96a_JaffaCakes118
-
Size
148KB
-
MD5
e9067f7bbeec4261dc4e3d84e937d96a
-
SHA1
844736da2acb00aaaad66ad09414b5e58660d2e0
-
SHA256
96b153763555536faae0913ba3ab3196e84b992e5d103f701359f7b64ee7c1b2
-
SHA512
afdfacbd96251addae8d5d40ab54c5de0b5ee5440256ccd99001938e0908422c6a31d522d5bc9eb489504420fcfcf2b037302810dd193bfbb28c7f7f83de4085
-
SSDEEP
3072:ywkY1P9F/N0RTg7xurw7QhweqdIktPAL9SJp9:KY1FF/N0RE7QTqjGS39
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9067f7bbeec4261dc4e3d84e937d96a_JaffaCakes118
Files
-
e9067f7bbeec4261dc4e3d84e937d96a_JaffaCakes118.dll windows:4 windows x86 arch:x86
ecfd4bbb2179fd15a7e236df26a786ca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ExitProcess
GetProcAddress
CloseHandle
OpenFileMappingA
CreateProcessA
HeapFree
HeapAlloc
InterlockedDecrement
GetComputerNameA
EnterCriticalSection
CopyFileA
GetModuleHandleA
LocalFree
UnmapViewOfFile
OpenEventA
InterlockedCompareExchange
GlobalFree
GetVolumeInformationA
WaitForSingleObject
CreateMutexW
GetCurrentProcess
Sleep
WriteFile
ReadProcessMemory
LeaveCriticalSection
GlobalAlloc
GetLastError
GetProcessHeap
GetTickCount
CreateEventA
MapViewOfFile
LoadLibraryA
GetModuleFileNameA
CreateFileMappingA
CreateDirectoryA
TerminateProcess
InterlockedIncrement
GetCommandLineA
WriteProcessMemory
SetLastError
CreateFileA
ole32
CoCreateGuid
CoUninitialize
CoSetProxyBlanket
OleSetContainedObject
CoInitialize
CoCreateInstance
OleCreate
CoTaskMemAlloc
user32
UnhookWindowsHookEx
GetCursorPos
SetWindowsHookExA
PeekMessageA
FindWindowA
GetMessageA
DefWindowProcA
PostQuitMessage
KillTimer
GetClassNameA
GetParent
SetWindowLongA
CreateWindowExA
SendMessageA
GetWindowLongA
ClientToScreen
SetTimer
GetWindowThreadProcessId
GetWindow
TranslateMessage
ScreenToClient
RegisterWindowMessageA
DestroyWindow
GetSystemMetrics
DispatchMessageA
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegSetValueExA
RegCloseKey
OpenProcessToken
SetTokenInformation
GetUserNameA
DuplicateTokenEx
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegQueryValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 969B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ