Static task
static1
Behavioral task
behavioral1
Sample
f3366310ab7985381e0c7b2aa0e40436_JaffaCakes118.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f3366310ab7985381e0c7b2aa0e40436_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f3366310ab7985381e0c7b2aa0e40436_JaffaCakes118
-
Size
28KB
-
MD5
f3366310ab7985381e0c7b2aa0e40436
-
SHA1
2124ffa731867d75fc84e99116a4e052bb40bdb5
-
SHA256
aa1effa4a890910a9b5f024f2d918d0018f3334869eef8869dedbc88deec86b9
-
SHA512
82e2a2e48ea3ebf4d8e6cb9091dfb388af884262b2d5a8789ee3ed836d097b233b2a69a3f827afdba346da20a6b3528c138a7ccfa34a233ec27525a59d33c1e6
-
SSDEEP
768:ddW6junwdlw/8yHHph1J/+XFi2Evx2hVs/86H:dd9j1dl/4f1J/72EvxgQ8m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3366310ab7985381e0c7b2aa0e40436_JaffaCakes118
Files
-
f3366310ab7985381e0c7b2aa0e40436_JaffaCakes118.dll windows:4 windows x86 arch:x86
a75076cda9f6daf75864c6c59c509a06
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
DeleteFileA
GetFileSize
GetFileType
GetProcAddress
LoadLibraryA
ReadFile
SetEndOfFile
VirtualAlloc
VirtualFree
VirtualProtect
user32
BeginPaint
CheckMenuRadioItem
CheckRadioButton
CreateMenu
CreateWindowExA
DestroyCursor
DestroyWindow
EndPaint
ExitWindowsEx
FindWindowExA
GetCapture
GetCursorPos
GetDC
GetSystemMetrics
GetWindow
GetWindowDC
GetWindowDC
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
SendMessageA
SetCursor
SetForegroundWindow
SetMenu
SetMenuItemInfoA
SetPropA
SetScrollPos
SetScrollRange
SetSysColors
SetTimer
SetWindowLongA
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
ValidateRect
WaitMessage
wvsprintfA
gdi32
SetWindowOrgEx
StretchBlt
TextOutA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 9KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE