LosskiwFpponf
Static task
static1
Behavioral task
behavioral1
Sample
f123602ad0fda9950e77c8c15023721d_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
f123602ad0fda9950e77c8c15023721d_JaffaCakes118
-
Size
188KB
-
MD5
f123602ad0fda9950e77c8c15023721d
-
SHA1
28570627bdd4425bdb56511bfc67b3dc2f618d17
-
SHA256
389c56ee82902e0068625b40c36e7a92693756ad1373903949b79cad1146f574
-
SHA512
dbb59bec47534fbb6240ecc4ed84298bb79a2366ef57f4bf28e5fa4902e7855458beb9d6e34ac8e9b0b61452f831518ec69b8603c8bfc132cda5bea4b5ae97ad
-
SSDEEP
3072:oA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAogo:ozIqATVfQeV2FZalKq6jtGJWuTmd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f123602ad0fda9950e77c8c15023721d_JaffaCakes118
Files
-
f123602ad0fda9950e77c8c15023721d_JaffaCakes118.dll windows:5 windows x86 arch:x86
e14682cd580b5bc2ebf0ee1ec113cb1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
setupapi
SetupLogErrorW
esent
JetEndSession
msvcrt
iswlower
memset
user32
ImpersonateDdeClientWindow
ShowOwnedPopups
winmm
waveOutGetNumDevs
gdi32
StretchBlt
mprapi
MprAdminGetErrorString
rpcrt4
RpcBindingSetAuthInfoExW
wintrust
CryptSIPCreateIndirectData
rasapi32
RasDeleteEntryW
oleaut32
VarUdateFromDate
BSTR_UserFree
kernel32
GetModuleHandleA
GetModuleFileNameW
WriteFile
GetTempPathA
GetModuleHandleW
EndUpdateResourceA
VirtualProtect
TransactNamedPipe
DebugBreak
SetDefaultCommConfigA
shlwapi
StrCmpNW
ChrCmpIA
advapi32
RegLoadAppKeyA
FreeSid
CreateServiceW
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ