Static task
static1
Behavioral task
behavioral1
Sample
f82ab7131f5c2fe739d1af34b713fef3_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f82ab7131f5c2fe739d1af34b713fef3_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f82ab7131f5c2fe739d1af34b713fef3_JaffaCakes118
-
Size
152KB
-
MD5
f82ab7131f5c2fe739d1af34b713fef3
-
SHA1
b78c8b941b746a4b6e8b67bd9c3a745c4f521bb7
-
SHA256
738bdccc597a533c8d87c4162b45dd161b993f021a09f0cf465da88ecf90df5d
-
SHA512
6553dd3859d422c650bafa5148da1247eba78076616d3587c5da66d0a0dc02cb670363e5788a241dfd70a90054fbf8291ee3c917cfd21a4d0b918d5d15247175
-
SSDEEP
3072:fTSy+XxnTi5c8R5cshlh657nCjCIgH1VW1ob6I:7h+BneFhlk57nCuIAHz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f82ab7131f5c2fe739d1af34b713fef3_JaffaCakes118
Files
-
f82ab7131f5c2fe739d1af34b713fef3_JaffaCakes118.dll windows:4 windows x86 arch:x86
a98a292a5f26fff3f3168821fe49af63
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
IsBadReadPtr
FlushInstructionCache
GetCurrentThread
VirtualProtect
FreeLibrary
SetThreadPriority
GetLastError
GetCurrentThreadId
CloseHandle
WaitForSingleObject
GetFileType
GetProcessVersion
GetFileSize
GetThreadPriority
FindFirstFileA
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSection
GetExitCodeProcess
OpenProcess
SetEvent
WaitForMultipleObjects
CreateEventA
HeapFree
GetProcessHeap
CreateThread
HeapAlloc
FindClose
FindNextFileA
GetModuleHandleA
lstrlenA
GetFileTime
CreateFileA
HeapReAlloc
HeapValidate
IsBadWritePtr
lstrlenW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
TerminateProcess
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
LoadLibraryA
GetProcAddress
MultiByteToWideChar
GetCurrentProcess
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
Sleep
FlushFileBuffers
RaiseException
InterlockedDecrement
InterlockedIncrement
MoveFileA
GetCommandLineA
GetVersion
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetStartupInfoA
SetFilePointer
ReadFile
WriteFile
WideCharToMultiByte
ExitProcess
SetStdHandle
user32
GetIconInfo
GetForegroundWindow
GetKeyboardLayout
MapVirtualKeyExA
DispatchMessageA
TranslateMessage
GetMessageA
GetWindowThreadProcessId
SetWindowLongA
ScreenToClient
GetDC
SetFocus
SetActiveWindow
SetWindowPos
GetClientRect
SetParent
SetThreadDesktop
SetForegroundWindow
GetWindowRect
SetRectEmpty
SetLastErrorEx
SetRect
SetCursorPos
FindWindowA
gdi32
SetRectRgn
advapi32
RevertToSelf
oleaut32
SysAllocStringLen
SysFreeString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SYNC Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ