Static task
static1
Behavioral task
behavioral1
Sample
ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118
-
Size
231KB
-
MD5
ea98564a7a860ece86eaf0c7da455c39
-
SHA1
f6bf5a7e37b946638787578f267d9d6f972bb148
-
SHA256
df5b80bef37de9678ddfc9c98bff2556b6f5d4580000e7a7521d762f0c163d8c
-
SHA512
008c6934e9514a0f8a2377b6c1d5576f5a607d1d16c6077887c45ca75fd5ae7cdcadd706b9982106709d3eb01129f2fff1b0d12e09ae057d4d2b45adb49f18cc
-
SSDEEP
3072:I7pXCIQ2L5fKv7Yr++FCa2qjrkGyJpqEc+B8a8ag1y5C7R+HuiezUE:I7pX/QG5iv7YrCan5yJQEZ8aR2QHuim
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118
Files
-
ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118.dll windows:4 windows x86 arch:x86
40fef233bcf6c2588627d48d87ba7d75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpyA
FreeLibrary
LocalFree
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GlobalAlloc
CreateFileMappingA
Sleep
CreateFileA
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
GetModuleFileNameA
GetSystemTime
lstrcatA
GetSystemDirectoryA
DeviceIoControl
lstrcatW
lstrlenA
GetFileSize
lstrcmpiW
GetModuleFileNameW
WriteFile
LockResource
SizeofResource
LoadResource
FindResourceA
lstrlenW
lstrcpyW
CreateFileW
TerminateJobObject
AssignProcessToJobObject
CreateJobObjectA
LoadLibraryExA
GetTempPathA
GetTickCount
InterlockedExchange
RtlUnwind
MoveFileA
GlobalFree
OpenProcess
GetStartupInfoA
CreateProcessA
CloseHandle
GetCurrentProcess
GetCurrentThreadId
CreateEventA
GetLastError
CreateThread
LoadLibraryA
GetProcAddress
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
lstrcmpiA
GetSystemDirectoryW
ExitProcess
VirtualQuery
user32
RegisterClassA
CreateWindowExA
GetMessageA
DispatchMessageA
DefWindowProcA
wsprintfW
wsprintfA
GetInputState
PostThreadMessageA
PeekMessageA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
CreateProcessAsUserA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
StartServiceA
CreateServiceA
OpenServiceA
OpenSCManagerA
DeleteService
ControlService
CloseServiceHandle
RegFlushKey
RegCreateKeyExA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss1 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ