LosskiwFpponf
Static task
static1
Behavioral task
behavioral1
Sample
edf55cf310dae7366c99e6da3cd54764_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
edf55cf310dae7366c99e6da3cd54764_JaffaCakes118
-
Size
188KB
-
MD5
edf55cf310dae7366c99e6da3cd54764
-
SHA1
323f7ddffa61716bc6d5c2021016df53d2d82c9c
-
SHA256
0d4659e48615374991ef361bdd61bff52c1c8b2e2933291d81c1e3be2b7b61ea
-
SHA512
e6a091232b42a2087a2d81903069be6f227c9670b54c846b3c3a0f9bf1868734609d363229ebfa3165e165089220251e7eb41bc908d7d083f8544809920f9ffb
-
SSDEEP
3072:lA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAo6o:lzIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource edf55cf310dae7366c99e6da3cd54764_JaffaCakes118
Files
-
edf55cf310dae7366c99e6da3cd54764_JaffaCakes118.dll windows:5 windows x86 arch:x86
e14682cd580b5bc2ebf0ee1ec113cb1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
setupapi
SetupLogErrorW
esent
JetEndSession
msvcrt
iswlower
memset
user32
ImpersonateDdeClientWindow
ShowOwnedPopups
winmm
waveOutGetNumDevs
gdi32
StretchBlt
mprapi
MprAdminGetErrorString
rpcrt4
RpcBindingSetAuthInfoExW
wintrust
CryptSIPCreateIndirectData
rasapi32
RasDeleteEntryW
oleaut32
VarUdateFromDate
BSTR_UserFree
kernel32
GetModuleHandleA
GetModuleFileNameW
WriteFile
GetTempPathA
GetModuleHandleW
EndUpdateResourceA
VirtualProtect
TransactNamedPipe
DebugBreak
SetDefaultCommConfigA
shlwapi
StrCmpNW
ChrCmpIA
advapi32
RegLoadAppKeyA
FreeSid
CreateServiceW
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ