Static task
static1
Behavioral task
behavioral1
Sample
0c3b8e974e0bb8c6f185e4e6574c69e6_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0c3b8e974e0bb8c6f185e4e6574c69e6_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0c3b8e974e0bb8c6f185e4e6574c69e6_JaffaCakes118
-
Size
117KB
-
MD5
0c3b8e974e0bb8c6f185e4e6574c69e6
-
SHA1
6fef9d2f5cf2e2b720cf7dd9c91dece3978d4294
-
SHA256
c01754436094802ccc48035a8679bf1f681ed6b20eb16a27cb796ba15eb8f628
-
SHA512
ea5559c58b3f663d3524c499e5c2ba4a866acea9ce4d0b75a4215d1d218c9f4ba191a093154f9ca56f89ee13ac097790bfc2148d83a93b9814fbe3dd4a601147
-
SSDEEP
3072:NiA9nEuBFV1kxtMmsF4LlPBHapqJbCTEhzOX0SkM2Qro7QyjQLxovpT/n60IEt:nE0msuL1UqzQro7QyjQypbT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c3b8e974e0bb8c6f185e4e6574c69e6_JaffaCakes118
Files
-
0c3b8e974e0bb8c6f185e4e6574c69e6_JaffaCakes118.dll windows:4 windows x86 arch:x86
237d914601b23cdc7115ff23838b705d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
SendInput
GetThreadDesktop
OpenInputDesktop
PostMessageA
OpenDesktopA
CallNextHookEx
GetForegroundWindow
UnhookWindowsHookEx
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
GetMessageA
GetActiveWindow
CharUpperA
wsprintfA
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
DispatchMessageA
SendMessageA
SetThreadDesktop
ExitWindowsEx
PostThreadMessageA
SetCursorPos
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
IsWindow
gdi32
BitBlt
DeleteObject
CreateCompatibleBitmap
GetDIBits
DeleteDC
SelectObject
CreateCompatibleDC
CreateDCA
GetDeviceCaps
advapi32
RegOpenKeyExA
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LogonUserA
CreateProcessAsUserA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
OpenServiceA
RegQueryValueExA
RegCloseKey
GetUserNameW
LookupPrivilegeValueA
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
OpenSCManagerA
DeleteService
ControlService
CloseServiceHandle
shell32
ShellExecuteA
SHFileOperationA
SHEmptyRecycleBinA
ole32
CreateStreamOnHGlobal
ws2_32
send
listen
setsockopt
bind
socket
select
closesocket
getsockname
ntohs
accept
WSAStartup
recv
inet_addr
gethostbyname
inet_ntoa
htons
connect
shlwapi
StrRChrA
StrChrA
StrStrA
SHDeleteKeyA
StrCmpNIA
StrCmpW
StrToIntA
psapi
GetModuleFileNameExA
imm32
ImmGetCompositionStringA
ImmGetCompositionStringW
ImmReleaseContext
ImmGetContext
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
winmm
waveInUnprepareHeader
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveInStop
waveInOpen
msvcrt
_onexit
_initterm
_adjust_fdiv
__dllonexit
getenv
strrchr
malloc
wcscmp
free
strchr
__CxxFrameHandler
_beginthread
??2@YAPAXI@Z
??3@YAXPAX@Z
kernel32
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
FindNextFileA
lstrcmpA
FindFirstFileA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
FreeLibrary
GetProcAddress
LoadLibraryA
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
LocalAlloc
CreateDirectoryA
SetFilePointer
FlushFileBuffers
lstrlenW
lstrcatW
OpenEventA
OpenMutexA
GetFileSize
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetVersion
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
GetTempPathA
GetCurrentThreadId
WriteFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
SearchPathA
OpenProcess
GetModuleFileNameA
InterlockedExchange
RaiseException
WideCharToMultiByte
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThread
Sleep
WaitForSingleObject
GetCurrentProcessId
lstrlenA
DeviceIoControl
CreateFileA
CloseHandle
GetSystemDirectoryA
SetEvent
DeleteFileA
GetStartupInfoA
lstrcatA
CreateProcessA
GetTickCount
lstrcpyA
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
njiuy Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ