Static task
static1
Behavioral task
behavioral1
Sample
ecbf9ccdfc4b17df412dca1b35fb56f1_JaffaCakes118.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
ecbf9ccdfc4b17df412dca1b35fb56f1_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ecbf9ccdfc4b17df412dca1b35fb56f1_JaffaCakes118
-
Size
28KB
-
MD5
ecbf9ccdfc4b17df412dca1b35fb56f1
-
SHA1
ae0e8a535d9060224dfc9810389a797341fb468c
-
SHA256
5b8e0859ce4eac455e3352506949685812655771743e45bab9e6b8dfc5d333c5
-
SHA512
bac4191b48c50cbf480d979381b1f6a2e60679dff74e6990c6abec6460d43bdedc56f498da1eb8d16066ee9140176316fa21ab81d9fdc089d9aeeb001be4f8f4
-
SSDEEP
384:jeny3Wlv8WucoEfIjYGol4BerTnXMSVpct5mAM:anynclfIjTomBerTnXPat5mX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ecbf9ccdfc4b17df412dca1b35fb56f1_JaffaCakes118
Files
-
ecbf9ccdfc4b17df412dca1b35fb56f1_JaffaCakes118.dll windows:4 windows x86 arch:x86
2c2ac732a4767441b0d19fb69c3e8965
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ToAscii
GetWindowTextA
EnableWindow
FindWindowA
FindWindowExA
EnumChildWindows
msvcrt
_adjust_fdiv
_itoa
_initterm
free
srand
memcmp
strrchr
atoi
rand
strchr
strcmp
strcpy
strstr
fopen
fwrite
fclose
fread
time
??2@YAPAXI@Z
memset
memcpy
??3@YAXPAX@Z
_strlwr
malloc
kernel32
DeleteFileA
CreateThread
ExitProcess
GetTickCount
GetModuleHandleA
InitializeCriticalSection
GetTempPathA
EnterCriticalSection
lstrlenA
LeaveCriticalSection
lstrcpyA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
VirtualAllocEx
GlobalAlloc
GlobalLock
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
Sleep
lstrcmpA
CopyFileA
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ