Static task
static1
Behavioral task
behavioral1
Sample
0faa1befa2f6b850c43da46bc35eadce_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0faa1befa2f6b850c43da46bc35eadce_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
0faa1befa2f6b850c43da46bc35eadce_JaffaCakes118
-
Size
36KB
-
MD5
0faa1befa2f6b850c43da46bc35eadce
-
SHA1
c5a846f4da456ce96555a350a2e3f2b826081e91
-
SHA256
174c2faed2f67c66ab7215aca30d3ead5e260fc508ba337cfb6cd20c8c372519
-
SHA512
8a3a105a0d8cd8eeb3f1b7276e2a23c06d409872f14b0106d84ed1680d5dc5b081c8f2a0771a19cc9cbead5bb14df5334c5ce1c24cfe147bc52f6589cf4304a5
-
SSDEEP
768:Qvo1L0d+Nnz4fke8nYS708/fmci/r96aGZXodcjpEFQH/aF5QM:u4L0d4nz4fkeCYS5/uB/rwYHW0QM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0faa1befa2f6b850c43da46bc35eadce_JaffaCakes118
Files
-
0faa1befa2f6b850c43da46bc35eadce_JaffaCakes118.dll windows:1 windows x86 arch:x86
52eba74c608a7be32677c42801c375e8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
gdi32
MoveToEx
kernel32
CloseHandle
CreateFileA
CreateThread
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
GetCommandLineA
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentVariableA
GetExitCodeThread
GetFileSize
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStringTypeA
GetVersionExA
GetVolumeInformationA
GlobalAlloc
GlobalFree
GlobalReAlloc
MoveFileA
MultiByteToWideChar
OpenProcess
ReadFile
ResumeThread
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetFilePointer
SetLastError
Sleep
SuspendThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateMutexA
CreateRemoteThread
FlushInstructionCache
FreeLibraryAndExitThread
GetCurrentProcess
IsBadStringPtrA
OpenMutexA
VirtualAllocEx
VirtualFreeEx
VirtualProtect
WriteProcessMemory
lstrcmpiA
lstrlenA
RtlMoveMemory
CreateToolhelp32Snapshot
Process32First
Process32Next
ole32
CLSIDFromProgID
CoCreateInstance
CoInitialize
CoUninitialize
ProgIDFromCLSID
oleaut32
GetActiveObject
SafeArrayCreate
SysAllocStringByteLen
SysFreeString
SysStringByteLen
VariantClear
VariantCopy
user32
CharLowerBuffA
CharNextA
CharUpperBuffA
CreateDialogIndirectParamA
CreateDialogParamA
CreateWindowExA
DialogBoxIndirectParamA
DialogBoxParamA
GetWindow
urlmon
URLDownloadToFileA
wininet
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetOpenUrlA
InternetReadFile
DeleteUrlCacheEntry
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.link Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rloc Size: 1024B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ