Static task
static1
Behavioral task
behavioral1
Sample
020ff6066b99ffe349c8140b716ad672_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
020ff6066b99ffe349c8140b716ad672_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
020ff6066b99ffe349c8140b716ad672_JaffaCakes118
-
Size
19KB
-
MD5
020ff6066b99ffe349c8140b716ad672
-
SHA1
884d9ab4daa439d3b7b3b98e958d8422368a9d8a
-
SHA256
bd2410fb43c90e5a916a4005d6845fae57720e43ab884708c249335405d2cfc7
-
SHA512
bf0640d8a3d41b61b46196a706fe556a033c0e3af129d6b3897fba8fa6234fa309fa7a74c8ac4a7f4df81f8fec4486fa2cf482a3fe9cb9e77f8c1131e20bdf2b
-
SSDEEP
384:FbHjZyqUDlv2kX2kWMX1HQSCCNzfYeUo6:tHdyq+vzx9pCCp/Uo6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 020ff6066b99ffe349c8140b716ad672_JaffaCakes118
Files
-
020ff6066b99ffe349c8140b716ad672_JaffaCakes118.dll windows:4 windows x86 arch:x86
4ede995e52f513871000736e99a7b62d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetPrivateProfileStringA
Sleep
CreateThread
CloseHandle
CreateEventA
OpenEventA
GetCommandLineA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
GetModuleHandleA
DeleteFileA
CreateFileA
WriteFile
GetFileSize
ReadFile
VirtualProtectEx
SetThreadPriority
IsBadReadPtr
GlobalUnlock
VirtualAlloc
VirtualFree
GlobalAlloc
GlobalLock
ReadProcessMemory
GlobalFree
GetProcAddress
GetModuleFileNameA
user32
UnhookWindowsHookEx
wsprintfA
GetMessageA
PostThreadMessageA
SetWindowsHookExA
CallNextHookEx
GetInputState
wininet
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ