winsockinit
Static task
static1
Behavioral task
behavioral1
Sample
f48fe9484afba9e1ba796d2cffe803b9_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f48fe9484afba9e1ba796d2cffe803b9_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f48fe9484afba9e1ba796d2cffe803b9_JaffaCakes118
-
Size
8KB
-
MD5
f48fe9484afba9e1ba796d2cffe803b9
-
SHA1
1a4c13c2d940e81fec3c39e9645a3838412e7d42
-
SHA256
b5abe81d77d5f2987f8ef4f73bdf558991211db94d104a13a40be352638aa268
-
SHA512
4cb4c3b47edc9c88ebabc1b540630136826ed405e9a3613555db095aac5cf97ca83cece87b405ed729308069306838d91ecc67157cd501ad72bad6ed38c14323
-
SSDEEP
192:5RH0AhesN3jPpZJOVBovRQMQXfutd99j3Y8:7QsNTPpZJO0vCMQXShj3Y8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f48fe9484afba9e1ba796d2cffe803b9_JaffaCakes118
Files
-
f48fe9484afba9e1ba796d2cffe803b9_JaffaCakes118.dll windows:4 windows x86 arch:x86
fea7844ba131ecf1130941504f57c336
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpyA
TerminateProcess
GetCurrentProcess
lstrcpynA
GetModuleHandleA
lstrlenA
DisableThreadLibraryCalls
GetCommandLineA
CreateThread
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
FlushInstructionCache
WriteProcessMemory
VirtualAlloc
ReadProcessMemory
VirtualProtect
IsBadCodePtr
lstrcatA
Sleep
GetModuleFileNameA
WinExec
user32
CharLowerA
SetWindowsHookExA
CallNextHookEx
wsprintfA
FindWindowA
advapi32
RegCreateKeyA
RegSetValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ