Static task
static1
Behavioral task
behavioral1
Sample
fb39a236a8d686570c86fb485a941efc_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fb39a236a8d686570c86fb485a941efc_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
fb39a236a8d686570c86fb485a941efc_JaffaCakes118
-
Size
6KB
-
MD5
fb39a236a8d686570c86fb485a941efc
-
SHA1
5398419faf615e4c03634c875592060ab41e8d5b
-
SHA256
d6b0ce3eae91c433fc8f3fc4359acf6c26b34b906c3773ed3c32c0ac4e087552
-
SHA512
12c7433986f749ecdbd01572deb091b1692c7d4d72578a90fbe0add4c066dbbef6bd90d60d9ce2f067883eb1c0b2fb610f1e2152a0bf242fc9699c6819449b26
-
SSDEEP
96:T4Mt01gIp1SWxDf4oiAj4ViGCEP6CmcMVdXl3J:Tlt01gIpTK64CEyyMj13
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb39a236a8d686570c86fb485a941efc_JaffaCakes118
Files
-
fb39a236a8d686570c86fb485a941efc_JaffaCakes118.dll windows:4 windows x86 arch:x86
f227589e0f5b9c7829d7089daf3ad876
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wininet
InternetGetConnectedState
HttpQueryInfoA
InternetReadFile
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
kernel32
CloseHandle
lstrcatA
CreateMutexA
GetLastError
GetModuleFileNameA
lstrcmpiA
CreateThread
GetTempPathA
WinExec
GetVersion
WriteFile
SetFilePointer
lstrlenA
Sleep
GetFileSize
CreateFileA
lstrcpyA
user32
wsprintfA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 294B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ