Static task
static1
Behavioral task
behavioral1
Sample
0c768249fecae308f1c326df3d1fb24e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c768249fecae308f1c326df3d1fb24e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
0c768249fecae308f1c326df3d1fb24e_JaffaCakes118
-
Size
822KB
-
MD5
0c768249fecae308f1c326df3d1fb24e
-
SHA1
b860d9659ab45479b012f156ae4709b591cfbda7
-
SHA256
13fda897677d8a02d27ff96c39fd556118dc804fa8946613bbcd948eb3d7532d
-
SHA512
7ceb2de7ec6dd9d79f2dfff2b25da01ff487e7c965a9da43ef059ea00a196b627f052b0862648d6de1e423ed5bbed39fd1a9aa43ab4ab651fa5717b59b5fda65
-
SSDEEP
24576:1JsLSvceq/+lbkWwhyYql/vPz9HnJnJGmF:1JsLSv2+p2wfNvfJG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c768249fecae308f1c326df3d1fb24e_JaffaCakes118
Files
-
0c768249fecae308f1c326df3d1fb24e_JaffaCakes118.dll windows:5 windows x86 arch:x86
070c71706acd32d2b6fffd660afe24bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTickCount
LocalAlloc
Sleep
VirtualProtect
user32
DrawEdge
GetDesktopWindow
GetKeyboardLayout
SetScrollPos
WaitMessage
SetScrollInfo
GetFocus
EnableMenuItem
ShowCursor
EnumThreadWindows
GetWindowLongA
SetActiveWindow
TranslateMDISysAccel
SetCursor
GetTopWindow
SetWindowTextA
SetTimer
GetMenuItemCount
RemovePropA
FindWindowA
InvalidateRect
LoadIconA
EndPaint
SetWindowLongA
DestroyMenu
GetCursorPos
ShowScrollBar
GetClassInfoA
RemoveMenu
FillRect
SetParent
ClientToScreen
GetClassNameA
LoadKeyboardLayoutA
RegisterClassA
CharToOemA
IsIconic
GetWindowTextA
GetScrollPos
EnableWindow
GetForegroundWindow
IntersectRect
SetMenu
TrackPopupMenu
GetCursor
GetKeyNameTextA
ReleaseDC
GetWindowRect
PostMessageA
GetScrollRange
GetParent
SendMessageA
SetClassLongA
SetPropA
CreatePopupMenu
DrawIconEx
GetMenuState
FrameRect
GetIconInfo
GetSubMenu
IsRectEmpty
SetForegroundWindow
MessageBoxA
LoadStringA
SetScrollRange
RedrawWindow
GetSystemMenu
SetFocus
SetWindowPlacement
GetWindowPlacement
SystemParametersInfoA
CreateIcon
OffsetRect
GetPropA
RegisterWindowMessageA
DestroyIcon
IsWindow
IsZoomed
GetSysColorBrush
PeekMessageA
DefWindowProcA
DispatchMessageA
EqualRect
CallNextHookEx
ShowOwnedPopups
DefFrameProcA
CharLowerBuffA
MsgWaitForMultipleObjects
GetDCEx
IsDialogMessageA
InsertMenuA
RegisterClipboardFormatA
CharLowerA
SetWindowPos
SetMenuItemInfoA
WinHelpA
GetSystemMetrics
ScrollWindow
GetMenuItemInfoA
CallWindowProcA
SetRect
GetDC
PostQuitMessage
InsertMenuItemA
IsWindowEnabled
CreateMenu
DrawMenuBar
MapWindowPoints
SetCapture
GetSysColor
ShowWindow
IsChild
KillTimer
CreateWindowExA
EnumWindows
GetActiveWindow
GetKeyState
UnhookWindowsHookEx
UpdateWindow
OemToCharA
DrawIcon
DrawFrameControl
GetKeyboardLayoutList
GetLastActivePopup
GetMenuStringA
DestroyWindow
ReleaseCapture
MapVirtualKeyA
DrawTextA
DefMDIChildProcA
DeleteMenu
DestroyCursor
GetWindowDC
UnregisterClassA
GetMenuItemID
InflateRect
GetCapture
AdjustWindowRectEx
LoadCursorA
GetWindowThreadProcessId
ActivateKeyboardLayout
GetClipboardData
CharNextA
GetMenu
ScreenToClient
WindowFromPoint
CheckMenuItem
LoadBitmapA
BeginPaint
SetWindowsHookExA
GetKeyboardState
GetWindow
GetClientRect
EnableScrollBar
IsWindowVisible
PtInRect
TranslateMessage
GetScrollInfo
gdi32
SetWindowOrgEx
RealizePalette
SetViewportOrgEx
RectVisible
CreateCompatibleBitmap
GetBrushOrgEx
PatBlt
GetTextMetricsA
DeleteObject
SetBrushOrgEx
SelectObject
SetDIBColorTable
GetCurrentPositionEx
SetWinMetaFileBits
MoveToEx
SetBkColor
GetDCOrgEx
CreateHalftonePalette
SetPixel
GetWinMetaFileBits
DeleteDC
CreateFontIndirectA
CreateSolidBrush
GetDIBColorTable
StretchBlt
CreateBrushIndirect
SelectPalette
GetEnhMetaFileHeader
SetEnhMetaFileBits
GetPaletteEntries
SetROP2
GetPixel
GetBitmapBits
PlayEnhMetaFile
UnrealizeObject
SetStretchBltMode
SetBkMode
CreateDIBSection
MaskBlt
GetStockObject
Polyline
LineTo
GetObjectA
CreatePenIndirect
RestoreDC
GetDIBits
GetEnhMetaFilePaletteEntries
Rectangle
GetWindowOrgEx
CopyEnhMetaFileA
GetTextExtentPoint32A
GetEnhMetaFileBits
BitBlt
SaveDC
SetTextColor
CreateCompatibleDC
IntersectClipRect
GetClipBox
GetSystemPaletteEntries
CreatePalette
GetDeviceCaps
CreateDIBitmap
DeleteEnhMetaFile
CreateBitmap
ExcludeClipRect
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32
VariantChangeType
VariantInit
VariantClear
SafeArrayCreate
SafeArrayGetUBound
VariantCopy
SafeArrayPtrOfIndex
SafeArrayGetLBound
comctl32
ImageList_DragShowNolock
ImageList_BeginDrag
ImageList_DrawEx
ImageList_SetIconSize
ImageList_DragMove
ImageList_DragEnter
ImageList_EndDrag
ImageList_Destroy
ImageList_GetImageCount
ImageList_Remove
ImageList_Add
ImageList_GetBkColor
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_Draw
ImageList_SetDragCursorImage
ImageList_DragLeave
ImageList_Read
ImageList_Write
ImageList_GetDragImage
ImageList_ReplaceIcon
ImageList_Create
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
netapi32
NetApiBufferSize
secur32
FreeCredentialsHandle
wldap32
ord99
msvcrt
exit
Sections
.text Size: 488KB - Virtual size: 487KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zond Size: 512B - Virtual size: 70B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xas Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.donc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fonb Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eeee Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ