Static task
static1
Behavioral task
behavioral1
Sample
0afd6932fabacbeb0e1c3faeed732835_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0afd6932fabacbeb0e1c3faeed732835_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0afd6932fabacbeb0e1c3faeed732835_JaffaCakes118
-
Size
204KB
-
MD5
0afd6932fabacbeb0e1c3faeed732835
-
SHA1
f6512d7b72a9e5f3d192626100909d2ca4639c50
-
SHA256
453ab2e8db7efbd3ce12323027d16d5d563d7982dcb3ddc2ad9be5fbdc249302
-
SHA512
e7c3daeb28e6022dd364b196b456ce7dab95bf87e1a2ada5a6b4b203fae916af3601fe420d2a06e51687f3534f34d2f758a2608400a9220e5977f68aca2daf1c
-
SSDEEP
3072:N+VMHnWWj1HZROlnR8ZvowGKbI6OI7Qrdc0i:kVrWj15RO95pfI2+0i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0afd6932fabacbeb0e1c3faeed732835_JaffaCakes118
Files
-
0afd6932fabacbeb0e1c3faeed732835_JaffaCakes118.dll windows:4 windows x86 arch:x86
5107ff104ec3d19901ce97ee7ce4ebb7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTimeZoneInformation
CreateEventA
GetTickCount
SetEvent
Sleep
GetProcAddress
LoadLibraryA
CreateMutexA
ResetEvent
WaitForSingleObject
GetModuleFileNameA
GetTempFileNameA
GetTempPathA
GetModuleHandleA
FreeResource
LockResource
SizeofResource
LoadResource
FindResourceA
CreateThread
GetCurrentProcessId
GetCurrentProcess
GetLocalTime
DeleteFileA
FreeLibrary
CreateFileA
LocalFree
FormatMessageA
GetLastError
GetSystemDefaultLangID
FindClose
SystemTimeToFileTime
GetSystemTime
FindFirstFileA
WriteProcessMemory
VirtualProtectEx
CreateProcessA
LocalAlloc
lstrlenA
lstrcpyA
SetFileTime
GetFileTime
GetVersionExA
SetHandleCount
GetStdHandle
DeleteCriticalSection
LCMapStringA
FatalAppExitA
InterlockedDecrement
GetFileAttributesA
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetEndOfFile
LCMapStringW
CloseHandle
ExitProcess
TerminateProcess
GetCommandLineA
GetVersion
EnterCriticalSection
LeaveCriticalSection
HeapFree
WriteFile
InitializeCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
ReadFile
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
VirtualFree
HeapAlloc
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
SetStdHandle
FlushFileBuffers
VirtualAlloc
HeapReAlloc
IsBadWritePtr
RtlUnwind
GetStringTypeA
SetFilePointer
UnhandledExceptionFilter
MultiByteToWideChar
GetStringTypeW
user32
IsWindow
MessageBoxA
GetWindowThreadProcessId
FindWindowA
PostMessageA
urlmon
URLDownloadToFileA
wininet
InternetQueryOptionA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetCloseHandle
HttpAddRequestHeadersA
InternetSetOptionA
HttpSendRequestA
InternetReadFile
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ