WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
0391a246cf92bdad21689766bde90019_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0391a246cf92bdad21689766bde90019_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0391a246cf92bdad21689766bde90019_JaffaCakes118
-
Size
344KB
-
MD5
0391a246cf92bdad21689766bde90019
-
SHA1
eaea90b509abc0e2db1164f8f5bdfa39a6b7f45f
-
SHA256
d7dc63b8c7ce4edd7c6576b64c466e0e59fe943ca5205a6d010872e8e53dce5f
-
SHA512
177d3f8e4bed14d18cecc487c73292d3b5b32885cd50dd25ec74ef55db83c4bd83e070024c259f7c46c49c7a487a2bd22b81a7f529a4de48099f7ad152781b47
-
SSDEEP
6144:oA9D/QBq2IfGzL9fxv+/dk0yEqDmgqzNbdTBf2BNHa:J9D/Q3qs+/d1qKzRbdTAv6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0391a246cf92bdad21689766bde90019_JaffaCakes118
Files
-
0391a246cf92bdad21689766bde90019_JaffaCakes118.dll windows:4 windows x86 arch:x86
b8432dda54081534d546d4fcf23805c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
netapi32
Netbios
kernel32
GetFileAttributesA
GetFileSize
MoveFileA
GetThreadLocale
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualAlloc
HeapReAlloc
GetCommandLineA
RtlUnwind
ExitProcess
RaiseException
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetExitCodeProcess
GetLocaleInfoW
SetEnvironmentVariableA
FindFirstFileA
FindClose
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
InterlockedIncrement
GlobalFlags
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleFileNameW
GlobalAddAtomA
LocalAlloc
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpA
GlobalAlloc
GetModuleHandleA
GetCurrentThreadId
lstrlenA
InterlockedExchange
CompareStringW
GetVersion
CompareStringA
WideCharToMultiByte
HeapFree
GetProcessHeap
HeapAlloc
MultiByteToWideChar
ReleaseMutex
WaitForSingleObject
CreateMutexA
OpenMutexA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetCurrentProcessId
GetTickCount
CreateThread
CreateProcessA
GetModuleFileNameA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
ExpandEnvironmentStringsA
Process32Next
OpenProcess
Process32First
GetVersionExA
CreateToolhelp32Snapshot
GetPrivateProfileStringA
CloseHandle
WritePrivateProfileStringA
DeleteFileA
SetFileTime
GetPrivateProfileIntA
CreateDirectoryA
GetFileTime
GetLastError
CreateFileA
Sleep
HeapSize
CreateFileW
user32
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
GetKeyState
GetCursorPos
ValidateRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
DestroyMenu
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
CharUpperA
DispatchMessageA
TranslateMessage
PeekMessageA
IsWindowVisible
GetWindow
FindWindowA
PostMessageA
GetWindowThreadProcessId
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetDlgItem
GetWindowLongA
LoadCursorA
GetSysColorBrush
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
GetUserNameA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegCloseKey
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegOpenKeyExA
RegQueryValueA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
UrlUnescapeA
PathIsUNCA
oleaut32
VariantInit
VariantChangeType
VariantClear
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
ws2_32
gethostbyname
getpeername
closesocket
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
Exports
Exports
Sections
.text Size: 228KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ