?RunShellWindowsWatcher@@YAXPAD@Z
Static task
static1
Behavioral task
behavioral1
Sample
0753bb53447e86e3ddab32007e4250e8_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0753bb53447e86e3ddab32007e4250e8_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0753bb53447e86e3ddab32007e4250e8_JaffaCakes118
-
Size
128KB
-
MD5
0753bb53447e86e3ddab32007e4250e8
-
SHA1
47a40359014195963673edf18458e2be5bfc8237
-
SHA256
0c580debf7414f0b90694dc368731d8308318415e544f37f6d9f0383ef9990b4
-
SHA512
39e4cfb0faeca5224df243d7bbcbb0b7f5032a5c188ca0e68cfd5a7e88edd0bca36d1faf274e8f66dfa4a3fc9675497275b5d992ed2fce25d46a893de4beb3f1
-
SSDEEP
3072:JHYdwBjX0tNc4c1OzBQ5SdILAzqzfkEOmBSW80lwJsGX:dTXIc4F+5SMAGDkEO+8BJsGX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0753bb53447e86e3ddab32007e4250e8_JaffaCakes118
Files
-
0753bb53447e86e3ddab32007e4250e8_JaffaCakes118.dll windows:4 windows x86 arch:x86
3fe180f2395e81296121c398972117c4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
lstrlenW
lstrlenA
GetTempPathA
MultiByteToWideChar
Sleep
GetCommandLineA
GetVolumeInformationA
CloseHandle
WriteFile
CreateFileA
GetTickCount
MoveFileA
DeleteFileA
ReadFile
GetFileSize
CopyFileA
CreateThread
CreateMutexA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetModuleFileNameA
InterlockedExchange
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetStringTypeW
GetStringTypeA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
GetStartupInfoA
GetFileType
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThreadId
LCMapStringA
LCMapStringW
GetOEMCP
GetCPInfo
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
HeapCreate
VirtualFree
IsBadWritePtr
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
VariantClear
SysAllocStringLen
VariantInit
shlwapi
PathFileExistsA
wininet
InternetReadFile
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
Exports
Exports
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ