Static task
static1
Behavioral task
behavioral1
Sample
08848406a6e9f86d5844773a07488e08_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08848406a6e9f86d5844773a07488e08_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
08848406a6e9f86d5844773a07488e08_JaffaCakes118
-
Size
28KB
-
MD5
08848406a6e9f86d5844773a07488e08
-
SHA1
8d7319d36a63cbce59147bbe3b46b16ee833f5bf
-
SHA256
de4bcaab626e69d5c5c7f6e37cf07bc91041e72f0adcabaaca0f6b370bac13c6
-
SHA512
5beaa7603e127d0b9e6ffb95c9b240149c20d41d815a957df2d138bb55b78b8b1b71fafb17d602083d68a1b54b8ed512405451c18f6d7918e750fa89e262676e
-
SSDEEP
192:XSjvj2nH0tBeDTmAAIJonG4KzJQh/Up+1msKhDAVlDkCda:ijjKHQGSIJG5JAea
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08848406a6e9f86d5844773a07488e08_JaffaCakes118
Files
-
08848406a6e9f86d5844773a07488e08_JaffaCakes118.dll windows:4 windows x86 arch:x86
ed23ea80c2295fd2dad249dccac4d476
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
ole32
CoInitialize
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
kernel32
CopyFileA
WinExec
WaitForSingleObject
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
Process32Next
CloseHandle
GetTempPathA
DeleteFileA
lstrcatA
GetSystemDirectoryA
CreateThread
GetModuleFileNameA
CreateMutexA
GlobalAddAtomA
OpenMutexA
GlobalFindAtomA
GetModuleHandleA
GetCurrentThread
GetCurrentProcess
Sleep
urlmon
URLDownloadToFileA
msvcp60
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
msvcrt
strcmp
_adjust_fdiv
_initterm
_onexit
__dllonexit
??2@YAPAXI@Z
sprintf
memcpy
free
strchr
strcpy
atoi
fclose
fopen
memset
strrchr
strlen
__CxxFrameHandler
_stricmp
ftell
fseek
fread
strcat
malloc
fwrite
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 914B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ