Static task
static1
Behavioral task
behavioral1
Sample
0dec47160cde733dc579f78d3dce1929_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dec47160cde733dc579f78d3dce1929_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0dec47160cde733dc579f78d3dce1929_JaffaCakes118
-
Size
112KB
-
MD5
0dec47160cde733dc579f78d3dce1929
-
SHA1
0118009ae143a0500cbf31240c1cc011800f3c09
-
SHA256
1b941942ab2d36102a54dd81972fba216dfdd6835780f479bb1d18f66b707d47
-
SHA512
0da1bfea67068ecc3ec4705dce950178075b6e23e1f881cf62bdd86638999976b5a03243fb2bcf847a2565429d5bf2d8ee65560c029886e4e9baa3f62884e732
-
SSDEEP
1536:eu9C1CIL0AyR+kBM/1bvaDb3ZGat/lchFa5whxYVZDRX2RM:F92CIxIPBKlQLoGYaanKx2RM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0dec47160cde733dc579f78d3dce1929_JaffaCakes118
Files
-
0dec47160cde733dc579f78d3dce1929_JaffaCakes118.dll windows:4 windows x86 arch:x86
c13fb238e60f6bfd908ff1847bd6b835
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAllocEx
Heap32Next
CreateSocketHandle
GetPrivateProfileSectionNamesW
FindFirstVolumeMountPointA
GetCurrentProcess
VirtualFree
GetSystemTime
ExitProcess
GetConsoleHardwareState
HeapDestroy
SetConsoleInputExeNameA
GetCommandLineW
user32
InvalidateRect
IsDialogMessageA
MessageBoxExA
GetMessageA
IsDialogMessage
GetWindowTextA
SetSysColorsTemp
SetScrollRange
GetMenu
LoadBitmapW
GetRawInputDeviceInfoA
gdi32
SetBoundsRect
PolyTextOutA
Sections
.text Size: 100KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ