_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
f7f04b55c5c826d8e08d746ef28ce454_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7f04b55c5c826d8e08d746ef28ce454_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f7f04b55c5c826d8e08d746ef28ce454_JaffaCakes118
-
Size
34KB
-
MD5
f7f04b55c5c826d8e08d746ef28ce454
-
SHA1
f65c76102ce09ef97cd91d3fd0569f361b0b6358
-
SHA256
395dd649d12cad3b94d90ccbaa49b8c44bc3589f37d91804e53450ca01251cea
-
SHA512
f967f017cc9dab745744de04dfdeec53edf1f381d70b6a7a45d93e8b4364e7e443c406e7f64a5566e09f6c6c27fc7858c3bc41e18b4cdff44c29bce6638db30a
-
SSDEEP
384:CIhgCPryFixgEHt9Ps7ZUtpq2LAaldcFRxC5UKmt+mfD4BA6ULItIFrkiD6ee9+x:+cgyt9Pzpq2LAafYQeKMMcxX64yC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7f04b55c5c826d8e08d746ef28ce454_JaffaCakes118
Files
-
f7f04b55c5c826d8e08d746ef28ce454_JaffaCakes118.dll windows:4 windows x86 arch:x86
277f10d805f0133c14167c7057c9253f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetEvent
CreateMutexA
CreateThread
GetModuleFileNameA
DisableThreadLibraryCalls
VirtualFree
VirtualProtect
VirtualAlloc
CreateFileA
DeviceIoControl
WaitForMultipleObjects
FlushFileBuffers
WriteFile
GetSystemDirectoryA
GetLastError
Process32Next
Process32First
GetCurrentProcessId
Module32Next
Module32First
VirtualQuery
GetSystemInfo
GetCommandLineA
InterlockedCompareExchange
InterlockedExchange
GetProcAddress
GetCurrentProcess
WinExec
GetTempFileNameA
GetShortPathNameA
GetTempPathA
InterlockedPopEntrySList
InterlockedPushEntrySList
InitializeSListHead
Sleep
FreeLibrary
ReleaseMutex
GetCurrentThread
SetThreadPriority
FreeLibraryAndExitThread
CreateEventA
WaitForSingleObject
ResetEvent
GetModuleHandleA
CreateFileMappingA
LoadLibraryA
OpenEventA
MapViewOfFile
UnmapViewOfFile
CloseHandle
CreateToolhelp32Snapshot
user32
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyState
ToAscii
MapVirtualKeyA
ShowWindow
UpdateWindow
CreateWindowExA
RegisterClassA
EnumDesktopWindows
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
CallNextHookEx
advapi32
OpenServiceA
CloseServiceHandle
RegOpenKeyA
RegEnumValueA
RegCloseKey
ControlService
OpenSCManagerA
StartServiceA
CreateServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
DeleteService
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
InternetConnectA
HttpSendRequestA
HttpAddRequestHeadersA
DeleteUrlCacheEntry
InternetCloseHandle
InternetCrackUrlA
InternetOpenA
HttpOpenRequestA
InternetReadFile
urlmon
URLDownloadToFileA
ws2_32
closesocket
WSACleanup
setsockopt
msvcrt
memset
__CxxFrameHandler
_local_unwind2
_except_handler3
_snprintf
strlen
_ismbcprint
_mbscmp
_mbsupr
time
_mbsrchr
_memicmp
_adjust_fdiv
malloc
_initterm
_onexit
__dllonexit
free
_ismbcspace
_mbsinc
memmove
sprintf
abs
memcmp
strcpy
_mbsstr
strcat
_mbsicmp
??2@YAPAXI@Z
memcpy
_mbsnbcpy
Exports
Exports
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ