confGLInterval
Static task
static1
Behavioral task
behavioral1
Sample
0a47d7696e900d1a1107e334f14f2ef4_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a47d7696e900d1a1107e334f14f2ef4_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0a47d7696e900d1a1107e334f14f2ef4_JaffaCakes118
-
Size
148KB
-
MD5
0a47d7696e900d1a1107e334f14f2ef4
-
SHA1
84ef42ff4a65dfa87300b6cf53491c47ee3607d1
-
SHA256
8e68e7d744aee416da5bb47f1d034499b1fffd0e76fdd373c0252a24a5450a58
-
SHA512
95b545b95206c19f28d1fa79460b899a591ed47bc7e89a915c8674df88bbba1224651c024d1e5856308e761507ae0d9f37b377ce60310c05324af0bc8450fd6a
-
SSDEEP
3072:jA8MULRTWQjZTPQaNmCdRXrIgczYcy2m1zLYGNcksgVoToL4dzverN/:jfRTWQjlPhNmihrEzOzZLc7VoL4dzveh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a47d7696e900d1a1107e334f14f2ef4_JaffaCakes118
Files
-
0a47d7696e900d1a1107e334f14f2ef4_JaffaCakes118.dll windows:4 windows x86 arch:x86
bc23705d84ffab6e3602865b863cf0de
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalAlloc
GetModuleFileNameA
LocalFree
OpenFileMappingA
InterlockedCompareExchange
CreateFileA
SetLastError
InterlockedDecrement
GetProcessHeap
WriteProcessMemory
WriteFile
UnmapViewOfFile
GetCurrentProcess
GetProcAddress
GlobalFree
HeapAlloc
GetCommandLineA
GetComputerNameA
GetTickCount
LoadLibraryA
LeaveCriticalSection
CloseHandle
OpenEventA
Sleep
CreateDirectoryA
CreateFileMappingA
CreateProcessA
TerminateProcess
ReadProcessMemory
CreateEventA
GetVolumeInformationA
EnterCriticalSection
HeapFree
MapViewOfFile
GetLastError
InterlockedIncrement
CopyFileA
WaitForSingleObject
GetModuleHandleA
CreateMutexW
ExitProcess
ole32
CoInitialize
CoTaskMemAlloc
OleSetContainedObject
CoCreateGuid
CoSetProxyBlanket
CoCreateInstance
OleCreate
CoUninitialize
user32
GetMessageA
CreateWindowExA
GetSystemMetrics
TranslateMessage
GetParent
GetClassNameA
FindWindowA
PeekMessageA
GetWindowThreadProcessId
DefWindowProcA
DestroyWindow
RegisterWindowMessageA
DispatchMessageA
SetWindowsHookExA
ScreenToClient
GetWindow
PostQuitMessage
SetTimer
GetCursorPos
GetWindowLongA
SendMessageA
KillTimer
ClientToScreen
SetWindowLongA
UnhookWindowsHookEx
oleaut32
SysAllocString
SysStringLen
SysFreeString
SysAllocStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
OpenProcessToken
SetTokenInformation
RegDeleteValueA
RegCloseKey
DuplicateTokenEx
RegCreateKeyExA
RegOpenKeyExA
GetUserNameA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yco Size: 4KB - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ