Static task
static1
Behavioral task
behavioral1
Sample
f28b574bdacc3a121018c5085992c7a5_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f28b574bdacc3a121018c5085992c7a5_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f28b574bdacc3a121018c5085992c7a5_JaffaCakes118
-
Size
124KB
-
MD5
f28b574bdacc3a121018c5085992c7a5
-
SHA1
3d1eeabce3218b48c09f730e4fd91b79f46a9b16
-
SHA256
52ec5293830b248fe7d1cc0ce8f6e8c8969465b1e71f887128bff576de92e78e
-
SHA512
744cc73b9b1662c6321a854afca4721f4cc9da7328c87076b7b56c7db967901e160eda71dd53308b6efabcaac809aa60d99c7577b97c0417ea192207fd44caa5
-
SSDEEP
3072:HXxOeUTg7o0HEVhkPK7HmyZ94DpLrJrVY3jfwjlhSv9nrPOD:BbUT10LPKwJCjfw+RPOD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f28b574bdacc3a121018c5085992c7a5_JaffaCakes118
Files
-
f28b574bdacc3a121018c5085992c7a5_JaffaCakes118.dll windows:4 windows x86 arch:x86
d869ac033d5ed8a3448dc4e8d0c35df3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateNamedPipeW
CreateThread
CreateMutexW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
GetTempPathW
DisableThreadLibraryCalls
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
ConnectNamedPipe
SetEvent
CreateEventW
WaitForMultipleObjects
DisconnectNamedPipe
GetProcAddress
FreeLibrary
OpenProcess
GetVersionExW
ProcessIdToSessionId
GetCurrentProcess
DuplicateHandle
VirtualProtect
GetProcessHeap
GetCurrentThread
LocalFree
GetCurrentProcessId
GetCurrentThreadId
CloseHandle
GetSystemDirectoryW
LoadLibraryExW
GetSystemWindowsDirectoryW
CreateDirectoryW
GetCommandLineA
SetUnhandledExceptionFilter
LCMapStringA
HeapSize
LoadLibraryA
RtlUnwind
GetVersionExA
InterlockedExchange
VirtualQuery
ExitProcess
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
GetSystemInfo
user32
OpenWindowStationW
GetUserObjectInformationW
wsprintfA
CloseWindowStation
advapi32
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
RevertToSelf
OpenThreadToken
ImpersonateNamedPipeClient
GetSecurityInfo
CreateProcessAsUserW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetServiceStatus
RegisterServiceCtrlHandlerExW
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
DuplicateToken
AddAccessDeniedAce
AccessCheck
GetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
rpcrt4
RpcBindingSetAuthInfoExW
RpcBindingFromStringBindingW
RpcBindingFree
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ