Static task
static1
Behavioral task
behavioral1
Sample
9c9417f80e2e1494be842d6316431638_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c9417f80e2e1494be842d6316431638_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
9c9417f80e2e1494be842d6316431638_JaffaCakes118
-
Size
20KB
-
MD5
9c9417f80e2e1494be842d6316431638
-
SHA1
f40411e58060cbae617f385c850a1686938c097b
-
SHA256
5e59dcbef9e8295cca552103baad1e27299ee640d936b6613c6f8eacfede6789
-
SHA512
2d0ac26af0d1a61efb754e6da00850ae2c5e08b30cc10ba3e46602adbd29c5cf586f58168ac8b2625faf90029dc7c5b24d302185bf5b25ca8186b73ef174b2cb
-
SSDEEP
384:WxHxYzHlFtQBDd1AGMII0eDmZrPK7pZlH2Zk/0UHu:WxRYzHlrY7PypZlHZ/0UHu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9c9417f80e2e1494be842d6316431638_JaffaCakes118
Files
-
9c9417f80e2e1494be842d6316431638_JaffaCakes118.dll windows:4 windows x86 arch:x86
504bb44c65d560079677d9eb62d9fc3d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
PDB Paths
Imports
msys-gcc_s-1
__deregister_frame_info
__register_frame_info
msys-2.0
__cxa_atexit
__errno
__locale_ctype_ptr
__stack_chk_fail
__stack_chk_guard
_impure_ptr
calloc
cygwin_internal
dll_dllcrt0
free
gmtime
localtime
malloc
msys_detach_dll
posix_memalign
realloc
strftime
strlen
strncasecmp
strncpy
strtol
tzset
kernel32
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
msys-perl5_26
Perl_croak_nocontext
Perl_croak_xs_usage
Perl_init_tm
Perl_newSViv
Perl_newSVpv
Perl_newXS_flags
Perl_safesysfree
Perl_safesysmalloc
Perl_safesysrealloc
Perl_stack_grow
Perl_sv_2iv_flags
Perl_sv_2mortal
Perl_sv_2nv_flags
Perl_sv_2pv_flags
Perl_warn_nocontext
Perl_xs_boot_epilog
Perl_xs_handshake
Exports
Exports
_C_time_locale
__gcc_deregister_frame
__gcc_register_frame
_time_localebuf
_time_using_locale
boot_Time__Piece
hmod_libgcc
push_common_tm
return_11part_tm
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 524B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 295B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ