LosskiwFpponf
Static task
static1
Behavioral task
behavioral1
Sample
ec51462a4db6ab68ee104455908ec9d9_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
ec51462a4db6ab68ee104455908ec9d9_JaffaCakes118
-
Size
188KB
-
MD5
ec51462a4db6ab68ee104455908ec9d9
-
SHA1
38909643c45aa41e8b263d3c2079488af1f100ce
-
SHA256
39159efd9985beb6915a9fcfba94886aa0b61b189c9baf8b023a1774f013cd93
-
SHA512
a0442c6732f4b570b93149a5498511f72af33a3906fbd2994dd4a9f7f09d99a2238242b1b70d2aac2d4ae9dfa0522e1cce0764883a4ad201aa18490d9b724bb1
-
SSDEEP
3072:YA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo/o:YzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec51462a4db6ab68ee104455908ec9d9_JaffaCakes118
Files
-
ec51462a4db6ab68ee104455908ec9d9_JaffaCakes118.dll windows:5 windows x86 arch:x86
e14682cd580b5bc2ebf0ee1ec113cb1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
setupapi
SetupLogErrorW
esent
JetEndSession
msvcrt
iswlower
memset
user32
ImpersonateDdeClientWindow
ShowOwnedPopups
winmm
waveOutGetNumDevs
gdi32
StretchBlt
mprapi
MprAdminGetErrorString
rpcrt4
RpcBindingSetAuthInfoExW
wintrust
CryptSIPCreateIndirectData
rasapi32
RasDeleteEntryW
oleaut32
VarUdateFromDate
BSTR_UserFree
kernel32
GetModuleHandleA
GetModuleFileNameW
WriteFile
GetTempPathA
GetModuleHandleW
EndUpdateResourceA
VirtualProtect
TransactNamedPipe
DebugBreak
SetDefaultCommConfigA
shlwapi
StrCmpNW
ChrCmpIA
advapi32
RegLoadAppKeyA
FreeSid
CreateServiceW
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ