Static task
static1
Behavioral task
behavioral1
Sample
ec15b0ed4412b682816c816c77303c3b_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ec15b0ed4412b682816c816c77303c3b_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ec15b0ed4412b682816c816c77303c3b_JaffaCakes118
-
Size
91KB
-
MD5
ec15b0ed4412b682816c816c77303c3b
-
SHA1
1239f70652e2677585d72e7f83652950f8958552
-
SHA256
beb7c35447c9f0bcdba6fd7345eeaaa4fbe838cd48ed223c76a44eab3651c059
-
SHA512
ebf945a0c1347b1d52409054dc39257132750a5bd682230e65b4fed8d34d1945facce2831fef5b5c2fdd854b35b97503f4e9704cb06b6b763ac8b0d5ce3648c4
-
SSDEEP
1536:btOFzaauM+T0zv0lJhe7DPP3gbLaYCn/fvc8U/3OtAGkgnSNoTF1NXRp:4FzXuTSvW/43gP1C308jtUNohXRp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec15b0ed4412b682816c816c77303c3b_JaffaCakes118
Files
-
ec15b0ed4412b682816c816c77303c3b_JaffaCakes118.dll windows:4 windows x86 arch:x86
69a71696ccbf389585e1eb2a02e25a0f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ShowScrollBar
ShowCaret
EndDeferWindowPos
EmptyClipboard
DrawCaption
DestroyMenu
DefDlgProcA
CopyImage
CharLowerA
kernel32
HeapValidate
SetHandleCount
SetEnvironmentVariableA
HeapDestroy
HeapCreate
ExitProcess
CloseHandle
VirtualFree
TlsGetValue
SetLastError
advapi32
RegSetValueExA
RegQueryValueExA
RegEnumValueA
comdlg32
GetOpenFileNameW
GetFileTitleW
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ