Behavioral task
behavioral1
Sample
ed91fa47bb8759dfff78a509edaee664_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed91fa47bb8759dfff78a509edaee664_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ed91fa47bb8759dfff78a509edaee664_JaffaCakes118
-
Size
136KB
-
MD5
ed91fa47bb8759dfff78a509edaee664
-
SHA1
e38799274505820de28124d7d199881e8d92ee09
-
SHA256
e25f70c8019344252d41ba0a3ddbe32c7d53b1d2cb27a0a398e4c7e5dc000251
-
SHA512
114691665ee51e8fdb5a06f5b55b89762271f2f348c04de13e5c720940c4baa7b2b44e3fbc0b5aff5c42ea8be1fcc140b08d0af5774b208442c69f82a660c618
-
SSDEEP
3072:bkjSE1YcDqNzQShxFaE5+/kq9Mpx+0VZxsdwaugl4k5y7:bkjSE1Y4qGSxaEwsqmxzbQp4
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed91fa47bb8759dfff78a509edaee664_JaffaCakes118
Files
-
ed91fa47bb8759dfff78a509edaee664_JaffaCakes118.dll windows:4 windows x86 arch:x86
47cc8fcfcca05b34fed148b03e5d47cf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeEnvironmentStringsA
LoadLibraryA
VirtualAlloc
GetModuleFileNameA
ExitProcess
user32
RegisterHotKey
MessageBoxA
Sections
.text Size: - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX2 Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ