Init
Static task
static1
Behavioral task
behavioral1
Sample
0736dd221aee505d33c2468fafe92e80_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0736dd221aee505d33c2468fafe92e80_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0736dd221aee505d33c2468fafe92e80_JaffaCakes118
-
Size
26KB
-
MD5
0736dd221aee505d33c2468fafe92e80
-
SHA1
60838a7efbda92ddeb3bf77c3adcc984a08d7016
-
SHA256
08fde56ce98dfc24fff9db6644cd6c1bbd044e66bd59d77347278e38e958b500
-
SHA512
c231bad05816664587f5625a40e207ebb50b393fb590a12c5c3d7c8593fcfddf69dbafa8ae97a14384dea71f0e174f16dcdc414752eb521eff52dc16fe3084cf
-
SSDEEP
768:FrzEbALdSq61hvXZWDgXNNfmV3Rww4nqWhP8RJf:F4bhgZV3RZWR8RJf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0736dd221aee505d33c2468fafe92e80_JaffaCakes118
Files
-
0736dd221aee505d33c2468fafe92e80_JaffaCakes118.dll windows:4 windows x86 arch:x86
004be43c7b42342a2d96657fa3119bd2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentThread
TerminateThread
GlobalFree
GlobalUnlock
CloseHandle
ReadFile
GlobalLock
GlobalAlloc
GetFileSize
CreateFileA
GetCurrentProcessId
GetPrivateProfileStringA
GetPrivateProfileIntA
GetComputerNameA
InitializeCriticalSection
VirtualProtectEx
IsBadReadPtr
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
SetThreadContext
OpenThread
ReadProcessMemory
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
VirtualAlloc
WritePrivateProfileStringA
GetLastError
CreateMutexA
ExitProcess
WriteProcessMemory
WaitForSingleObject
ResetEvent
SetEvent
CreateEventA
DeleteFileA
GetModuleFileNameA
GetCurrentProcess
GetCurrentThreadId
CreateProcessA
CreateThread
Sleep
GetModuleHandleA
SetUnhandledExceptionFilter
user32
GetWindowThreadProcessId
GetDesktopWindow
GetClassNameA
GetWindowTextA
TranslateMessage
CallNextHookEx
SetWindowsHookExA
GetMessageA
GetWindow
DispatchMessageA
FindWindowExA
UnhookWindowsHookEx
SendMessageA
GetForegroundWindow
FindWindowA
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
shlwapi
PathFileExistsA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
msvcrt
_adjust_fdiv
malloc
_initterm
free
??3@YAXPAX@Z
sscanf
fread
strcat
??2@YAPAXI@Z
wcslen
_strnicmp
_stricmp
_strlwr
strcmp
memcpy
sprintf
strstr
strrchr
memset
strchr
fclose
fopen
strlen
strcpy
strncpy
Exports
Exports
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdt Size: 512B - Virtual size: 281B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ