Static task
static1
Behavioral task
behavioral1
Sample
4793f12ab09ca31973a406b5b7f922d9_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
4793f12ab09ca31973a406b5b7f922d9_JaffaCakes118
-
Size
239KB
-
MD5
4793f12ab09ca31973a406b5b7f922d9
-
SHA1
5c67cc128cf3ebc18b4cf3e68572915bcee75f73
-
SHA256
86c04f8984f540bce436da84987705137a3efb548fc46ec4b28db62be7548934
-
SHA512
947d31acd7d818922c395fee969cb1516c8ef43582446d8349c71ad450ccd6fb115d42be6f0a42d5783bd2d539b63b2874d86bfff94088f6cf6352181214ca05
-
SSDEEP
3072:E9jW9lCztEjPEUEz5od5csjgDOQNp4Mk/58Xs3gxA33K3HaisqYa7m7/1lx57eDi:E9LR4PEz5owqBExu6DWK0a7C7eDi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4793f12ab09ca31973a406b5b7f922d9_JaffaCakes118
Files
-
4793f12ab09ca31973a406b5b7f922d9_JaffaCakes118.dll windows:5 windows x86 arch:x86
41a246659e190ae08807203d1ced6312
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
WritePrivateProfileStructW
WritePrivateProfileStringW
WaitForSingleObject
UpdateResourceA
SetLastError
SetComputerNameExA
SearchPathW
QueryPerformanceCounter
LocalHandle
LoadResource
LoadLibraryW
IsBadStringPtrA
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetProfileIntW
GetProcessWorkingSetSize
GetProcAddress
GetPrivateProfileStringW
GetNamedPipeInfo
GetLastError
GetCurrentThreadId
GetCurrentProcessId
GetCompressedFileSizeW
GetCompressedFileSizeA
GetCommandLineW
FreeLibrary
ExpandEnvironmentStringsW
ExitProcess
DeleteTimerQueueTimer
DeleteAtom
ConnectNamedPipe
user32
SetMenuContextHelpId
SetMenuItemInfoA
SetParent
SetRect
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowTextA
SetWindowWord
ShowWindow
SystemParametersInfoA
SystemParametersInfoW
TrackPopupMenu
TrackPopupMenuEx
TranslateAcceleratorA
TranslateMessage
UnhookWindowsHook
UnionRect
UpdateWindow
ValidateRect
WinHelpA
wsprintfA
wsprintfW
LoadIconW
OffsetRect
MsgWaitForMultipleObjects
MoveWindow
ModifyMenuA
MessageBoxA
MessageBeep
MapWindowPoints
LoadStringW
LoadStringA
LoadMenuIndirectA
LoadMenuA
LoadImageA
LoadIconA
LoadCursorA
LoadBitmapA
LoadAcceleratorsA
KillTimer
IsWindowVisible
IsWindowEnabled
IsWindow
IsDlgButtonChecked
IsDialogMessageA
IsChild
IsCharUpperA
InvalidateRgn
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InSendMessage
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindow
GetUserObjectInformationA
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
SetForegroundWindow
GetScrollPos
GetScrollBarInfo
GetParent
GetMessagePos
GetMessageA
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyState
GetKBCodePage
GetIconInfo
GetForegroundWindow
GetFocus
GetDoubleClickTime
GetDlgItemTextA
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClipboardFormatNameA
GetClientRect
GetClassNameA
GetClassInfoExA
GetClassInfoA
FrameRect
FindWindowExA
FindWindowA
FillRect
ExitWindowsEx
EqualRect
EndPaint
EndDialog
EndDeferWindowPos
EnableWindow
EnableMenuItem
EmptyClipboard
DrawTextA
DrawIconEx
DrawFocusRect
DrawEdge
DispatchMessageA
DialogBoxParamA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
DeleteMenu
DeferWindowPos
DefWindowProcA
CreateWindowStationA
CreateWindowExA
CreateDialogParamA
CreateAcceleratorTableA
CopyAcceleratorTableA
CloseClipboard
CheckRadioButton
CheckMenuItem
CheckDlgButton
CharUpperBuffA
CharUpperA
CharToOemA
CharNextA
CharLowerA
CallWindowProcA
BroadcastSystemMessageW
BeginPaint
SetFocus
SetDlgItemTextA
OpenClipboard
SetCursor
SetClipboardData
SetCapture
SendMessageTimeoutA
SendMessageA
SendDlgItemMessageA
ScrollWindowEx
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClassExA
RegisterClassA
RedrawWindow
PtInRect
PostThreadMessageA
PostMessageA
GetSubMenu
PeekMessageA
BeginDeferWindowPos
AppendMenuA
AdjustWindowRectEx
SetCursorPos
gdi32
LPtoDP
GetTextMetricsA
GetTextExtentPointA
GetTextExtentPoint32A
GetSystemPaletteUse
GetSystemPaletteEntries
GetStockObject
GetPixelFormat
GetObjectA
GetMapMode
GetICMProfileW
GetDeviceCaps
GetCharWidth32A
GetCharABCWidthsFloatW
GetBkColor
FillPath
ExtTextOutA
ExtCreateRegion
EngLoadModule
DeleteObject
DeleteDC
CreateSolidBrush
CreateScalableFontResourceW
CreateRectRgnIndirect
CreatePen
CreatePalette
CreateMetaFileA
CreateFontIndirectA
CreateDIBSection
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
LineTo
GetColorSpace
GetLayout
GetFontLanguageInfo
GetObjectType
CreateHalftonePalette
EndDoc
GetEnhMetaFileA
GetDCPenColor
CreatePatternBrush
GetBkMode
GetEnhMetaFileW
CreateMetaFileW
CancelDC
FlattenPath
EndPath
DeleteColorSpace
DeleteEnhMetaFile
GetGraphicsMode
GetDCBrushColor
CloseEnhMetaFile
EndPage
DeleteMetaFile
CloseFigure
CloseMetaFile
StretchDIBits
StretchBlt
SetWindowOrgEx
SetViewportOrgEx
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SetBitmapBits
SelectPalette
SelectObject
SaveDC
RestoreDC
RectInRegion
RealizePalette
PlayEnhMetaFileRecord
PatBlt
PATHOBJ_bEnum
MoveToEx
BitBlt
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
CloseServiceHandle
ControlService
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptReleaseContext
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
QueryServiceStatus
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegOpenKeyExW
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RegSetValueExW
StartServiceA
RegQueryValueExW
RegOpenKeyW
shell32
SHCreateProcessAsUserW
ShellExecuteExW
ShellExecuteA
SHPathPrepareForWriteW
SHGetSpecialFolderPathW
CheckEscapesW
ExtractAssociatedIconA
ExtractAssociatedIconExA
SHCreateDirectoryExW
ShellExecuteW
SHGetDataFromIDListA
SHGetFileInfoA
SHGetFolderLocation
SHGetSettings
SHGetSpecialFolderPathA
shlwapi
StrChrW
StrCmpNIA
StrStrA
StrChrA
StrStrIA
comctl32
PropertySheetA
ImageList_ReplaceIcon
ImageList_Create
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ