WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
0d49bd5712832895dd4eae2c63c21824_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0d49bd5712832895dd4eae2c63c21824_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
0d49bd5712832895dd4eae2c63c21824_JaffaCakes118
-
Size
54KB
-
MD5
0d49bd5712832895dd4eae2c63c21824
-
SHA1
045f94aded5f65f8b8050667389411961f7583b0
-
SHA256
9b8bbe17e9dc16e1c1ffb303a005c4e265430563f2652ae9b9f0794206c4d288
-
SHA512
15aa57d3d393333aaea19ff50891c06c01b1a3bdbfec78c5bccbdb025a433b0b8a5e06a735982db86833ca904a3ebe4e1d3084b702d0fa04c32287c7d84fd50a
-
SSDEEP
1536:FoiyGManETap5q61xZ8vH2YWTlV7CKb15J7zs/Cq:FoiyfaEw5q61xZgWYWlV7CKv7g/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d49bd5712832895dd4eae2c63c21824_JaffaCakes118
Files
-
0d49bd5712832895dd4eae2c63c21824_JaffaCakes118.dll windows:4 windows x86 arch:x86
3e1e78a084287efef5d2262be36d181e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetFileAttributesA
CreateFileA
GetDriveTypeA
GetLogicalDriveStringsA
GetTickCount
FindClose
FindFirstFileA
SetFilePointer
DeleteFileW
FindNextFileW
FileTimeToSystemTime
CreateFileW
FindFirstFileW
GetTempPathW
DeleteFileA
FindNextFileA
GetTempPathA
GetVersionExA
LoadLibraryA
GetFileTime
lstrlenA
TerminateThread
ReleaseMutex
GetModuleFileNameA
DeviceIoControl
OpenMutexA
MoveFileExA
MoveFileA
CopyFileA
GetSystemDirectoryA
GetLastError
FreeLibrary
SetFileTime
GetComputerNameA
CreateMutexA
SetCurrentDirectoryA
FlushFileBuffers
SetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
ExpandEnvironmentStringsA
WriteFile
lstrcpyA
CreatePipe
CreateProcessA
CreateThread
WaitForSingleObject
ReadFile
PeekNamedPipe
GetCurrentProcess
TerminateProcess
Sleep
OpenProcess
CloseHandle
GetProcAddress
user32
DestroyWindow
IsWindow
SendMessageA
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupAccountSidA
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
RegOpenKeyExA
shell32
ShellExecuteA
StrStrIA
ws2_32
socket
inet_ntoa
inet_addr
closesocket
gethostbyname
htons
sendto
recvfrom
setsockopt
recv
WSAIoctl
bind
gethostname
ntohs
send
connect
WSAStartup
msvfw32
MCIWndCreateA
avicap32
capCreateCaptureWindowA
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
msvcrt
_strlwr
_itoa
_strnicmp
_adjust_fdiv
malloc
_initterm
free
memchr
strrchr
strncmp
fopen
fseek
fread
fclose
rename
swprintf
wcslen
strstr
time
srand
rand
??2@YAPAXI@Z
atoi
_except_handler3
sprintf
??3@YAXPAX@Z
__CxxFrameHandler
shlwapi
SHGetValueA
SHSetValueA
Exports
Exports
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inidata Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ