ieCommsNetM
Static task
static1
Behavioral task
behavioral1
Sample
0fa89c0f6bfea6361ea614220e96c8b0_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0fa89c0f6bfea6361ea614220e96c8b0_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0fa89c0f6bfea6361ea614220e96c8b0_JaffaCakes118
-
Size
144KB
-
MD5
0fa89c0f6bfea6361ea614220e96c8b0
-
SHA1
1f78944c7caf9697ae40f48515fd00b968f1302e
-
SHA256
a1c92608498a31bf01c24886c98f49079f13312b572fa5fe85ce59e667fcfa84
-
SHA512
5d9f239b8887a33350af9e2efaa93535a18d6c8cb6494cc27684956222ad1222ab1444c3fce391b1e176f2a460b55c835e92fbe30041a7f1f64689e39938f3b9
-
SSDEEP
3072:y95kv1hoZuoGDOhSYYVlEfpdTGJ28i5tzNExLx6JyaXUOWSZAp+:kAhzDOnqlEBJw28i5dNK1VyBWSZ6+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fa89c0f6bfea6361ea614220e96c8b0_JaffaCakes118
Files
-
0fa89c0f6bfea6361ea614220e96c8b0_JaffaCakes118.dll windows:4 windows x86 arch:x86
44aa0257cd6e4c7f0e2795e1c63dea6b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetComputerNameA
CloseHandle
GetCurrentProcess
GetTickCount
OpenFileMappingA
EnterCriticalSection
ReadProcessMemory
InterlockedDecrement
Sleep
CreateMutexW
LeaveCriticalSection
WriteFile
GetProcAddress
LocalFree
GetVolumeInformationA
InterlockedIncrement
SetLastError
CopyFileA
CreateFileMappingA
WaitForSingleObject
CreateDirectoryA
UnmapViewOfFile
InterlockedCompareExchange
ExitProcess
WriteProcessMemory
CreateFileA
GlobalFree
MapViewOfFile
HeapAlloc
GetModuleHandleA
GetCommandLineA
OpenEventA
GetModuleFileNameA
CreateEventA
HeapFree
LoadLibraryA
GetProcessHeap
GetLastError
GlobalAlloc
TerminateProcess
CreateProcessA
ole32
CoTaskMemAlloc
CoCreateInstance
CoCreateGuid
CoSetProxyBlanket
CoInitialize
CoUninitialize
OleCreate
OleSetContainedObject
user32
DispatchMessageA
GetWindowLongA
GetClassNameA
DefWindowProcA
FindWindowA
SendMessageA
CreateWindowExA
GetSystemMetrics
RegisterWindowMessageA
GetCursorPos
DestroyWindow
GetMessageA
PeekMessageA
GetWindow
ScreenToClient
GetParent
SetWindowLongA
KillTimer
UnhookWindowsHookEx
ClientToScreen
PostQuitMessage
TranslateMessage
SetWindowsHookExA
SetTimer
GetWindowThreadProcessId
oleaut32
SysAllocString
SysFreeString
SysStringLen
SysAllocStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegSetValueExA
OpenProcessToken
RegDeleteKeyA
RegQueryValueExA
SetTokenInformation
GetUserNameA
DuplicateTokenEx
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ