Static task
static1
Behavioral task
behavioral1
Sample
06932eaa5ea0d84e7f9ac4033d14ae8b_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06932eaa5ea0d84e7f9ac4033d14ae8b_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
06932eaa5ea0d84e7f9ac4033d14ae8b_JaffaCakes118
-
Size
131KB
-
MD5
06932eaa5ea0d84e7f9ac4033d14ae8b
-
SHA1
99ab40a63ec64e887338655f83e32e53b3810ef9
-
SHA256
6c7926eb46ffadd2e9d6013171518898105208ab5e26c83f758778f95d3f92ec
-
SHA512
65f6a7a6dd92fb00db4fd5cbf3dad4416e67b32b23841bc20446c060658b88822ce741f9ebc860a5853b6c26e80dd3152aa9da78410ca8db076a5c7aea43c1b6
-
SSDEEP
768:VMpEeVtWtMElOxIe6annGTDBDh4h9wWJpfUx:25V8agOzOBDh4hLUx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06932eaa5ea0d84e7f9ac4033d14ae8b_JaffaCakes118
Files
-
06932eaa5ea0d84e7f9ac4033d14ae8b_JaffaCakes118.dll windows:4 windows x86 arch:x86
8e3b19e78ce6e1ebd9beca3b59978e3a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
Thread32Next
GetThreadPriority
OpenThread
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
GetPrivateProfileStringA
ExitProcess
CreateMutexA
GetModuleHandleA
IsBadReadPtr
GetCommandLineA
GetTickCount
TerminateProcess
OpenProcess
ResumeThread
WriteProcessMemory
VirtualProtectEx
GlobalFree
GetProcAddress
ReadProcessMemory
GetCurrentProcess
GetCurrentThreadId
DisableThreadLibraryCalls
RaiseException
InitializeCriticalSection
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
SetThreadContext
SetUnhandledExceptionFilter
Process32Next
Process32First
TerminateThread
WriteFile
SetEvent
CreateEventA
GetLastError
WaitForSingleObject
ResetEvent
CreateFileA
ReadFile
CloseHandle
Sleep
DeleteFileA
GetModuleFileNameA
GetTempPathA
user32
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
GetWindowThreadProcessId
GetKeyState
FindWindowA
imagehlp
ImageUnload
ImageLoad
shlwapi
PathFileExistsA
msvcrt
fopen
free
_initterm
malloc
_strlwr
_adjust_fdiv
_stricmp
fread
fclose
strstr
wcslen
strcmp
strncpy
strcat
sprintf
memcpy
strlen
strcpy
memset
??2@YAPAXI@Z
strrchr
rand
srand
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ