ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
04f53ffae278d2120f63e20999c6babe_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
04f53ffae278d2120f63e20999c6babe_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
04f53ffae278d2120f63e20999c6babe_JaffaCakes118
-
Size
59KB
-
MD5
04f53ffae278d2120f63e20999c6babe
-
SHA1
32dfcd17ff1b3cbb2d331e5f1b05473de037db8c
-
SHA256
3dfb80f7fb90ded768d53736549fc0f22871cb126792afbe48c2dcf4444643c9
-
SHA512
3c712971ee0cf2fa5cba1f87ffb3886cd10366232af35ee8354d47bab27678a2a409cf1bcf9cfe47d9ec4af6257e2414fb153d6963463017b711e4948f6e47e1
-
SSDEEP
1536:Bzz0u5/zDWmjX8WZTTiidRb2tN0nFCfCNgNat9u/X0UKuN4C:hn5bS8X8eGkb2tOnuCNgNaLuNr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04f53ffae278d2120f63e20999c6babe_JaffaCakes118
Files
-
04f53ffae278d2120f63e20999c6babe_JaffaCakes118.dll windows:4 windows x86 arch:x86
6676615c9bac8d4cab721d624b3a5e2a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
oleaut32
SysFreeString
advapi32
RegQueryValueExA
user32
GetKeyboardType
gdi32
SelectObject
wsock32
TransmitFile
ws2_32
WSAWaitForMultipleEvents
urlmon
URLDownloadToFileA
wininet
InternetReadFile
shell32
ShellExecuteExA
ntdll
NtQuerySystemInformation
avicap32
capGetDriverDescriptionA
imagehlp
MakeSureDirectoryPathExists
powrprof
CallNtPowerInformation
winmm
waveInUnprepareHeader
msvfw32
ICCompressorFree
Exports
Exports
Sections
.text Size: 51KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE