Main
Static task
static1
Behavioral task
behavioral1
Sample
fdd69c75d3db72b7f1f7888432eb4972_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fdd69c75d3db72b7f1f7888432eb4972_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
fdd69c75d3db72b7f1f7888432eb4972_JaffaCakes118
-
Size
1.4MB
-
MD5
fdd69c75d3db72b7f1f7888432eb4972
-
SHA1
a34eb058c16e02beaf8665420b6aae0fe027eb2b
-
SHA256
c1bec740d32ff293fc343dae42630cb3c199f9d255b575cbe75b603b81b9a4a5
-
SHA512
2ede5386eb79e9818efdc78ec9c4c0fc405e24b898575bc6476f68d83b4bcc6fe2cbeeba3898f612407d140e95f7c51bdd004e04df085652b45ce87e7cf0b9b1
-
SSDEEP
24576:dOT8BfJSIQCDJ0OXNSQpniag1/rf+pCbIEzW+/m/rF7kchbIEzW+/m/6F7k0:dpOEJ0OXNSCyr007zWYNcV7zWYY0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdd69c75d3db72b7f1f7888432eb4972_JaffaCakes118
Files
-
fdd69c75d3db72b7f1f7888432eb4972_JaffaCakes118.dll windows:4 windows x86 arch:x86
eeee0e3b7f53e26bed2fc1e217db2201
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
VirtualFree
GetEnvironmentVariableW
CreateMutexW
CloseHandle
WaitForSingleObject
ReleaseMutex
lstrlenW
FindResourceW
LoadResource
LockResource
SizeofResource
lstrcpyW
ExpandEnvironmentStringsW
lstrcmpiA
WriteFile
GetCurrentProcessId
GetModuleFileNameW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetCommandLineW
lstrcatW
WideCharToMultiByte
LocalFree
ExitProcess
lstrcmpA
lstrcmpiW
CreateDirectoryW
HeapFree
GetProcessHeap
HeapAlloc
GetSystemInfo
lstrcpyA
lstrlenA
FreeLibrary
ResumeThread
InterlockedDecrement
SuspendThread
DuplicateHandle
GetCurrentThread
SetEvent
HeapCreate
InterlockedIncrement
VirtualQuery
Sleep
CreateThread
FindResourceExW
CreateProcessW
SetFilePointer
ReadFile
TlsSetValue
TlsGetValue
GetLocaleInfoW
GetLastError
CreateProcessA
TerminateProcess
ReadProcessMemory
VirtualFreeEx
OpenProcess
CreateRemoteThread
CreateEventW
CreatePipe
VirtualAllocEx
WriteProcessMemory
GetFileAttributesW
LoadLibraryExW
GetFileSize
EnumResourceNamesW
VirtualProtectEx
SetLastError
TlsAlloc
SystemTimeToFileTime
GetSystemTime
GetSystemDirectoryW
GetFullPathNameW
FlushFileBuffers
GetTickCount
GetCurrentThreadId
MultiByteToWideChar
lstrcpynW
QueryDosDeviceW
GetLogicalDriveStringsW
SetErrorMode
LoadLibraryW
LoadLibraryA
GetCurrentProcess
FlushInstructionCache
VirtualProtect
GetModuleHandleW
CreateFileW
GetProcAddress
user32
MessageBoxA
wsprintfA
wsprintfW
advapi32
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegSetValueExW
ole32
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
oleaut32
LoadTypeLi
VariantInit
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayDestroy
SysAllocString
SysFreeString
RegisterTypeLi
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ