oleCommonCmds
Static task
static1
Behavioral task
behavioral1
Sample
0e1a8915578803a5adfce3fb9d810cbe_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0e1a8915578803a5adfce3fb9d810cbe_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0e1a8915578803a5adfce3fb9d810cbe_JaffaCakes118
-
Size
148KB
-
MD5
0e1a8915578803a5adfce3fb9d810cbe
-
SHA1
26572085a285a61aa523f174c9863a1f2ce059e7
-
SHA256
35bcbb9ab0b0eda2dbf98d36b17eca4ac09e18ed213afa70b20c17cb2e67184a
-
SHA512
e462f78fbbbbfb083b9980148a43352af3db9daa000af823004f6b4828caa547e01bc9d1219a4e6e950a59e673159a545d32c15562977c73fb546991ae0b89c5
-
SSDEEP
3072:YSos+xMPXjq2O3xtCon8JICiVNjw5/GW6eFna5UDk6c6r:Yuj3ytCK+qwpJ/0Uc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e1a8915578803a5adfce3fb9d810cbe_JaffaCakes118
Files
-
0e1a8915578803a5adfce3fb9d810cbe_JaffaCakes118.dll windows:4 windows x86 arch:x86
4c14453d2676d1b5da4240e045fe4710
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
OpenFileMappingA
CreateEventA
InterlockedCompareExchange
WaitForSingleObject
GetTickCount
CloseHandle
OpenEventA
GetCommandLineA
GlobalAlloc
CreateFileMappingA
GetProcAddress
GetLastError
CreateProcessA
InterlockedIncrement
LoadLibraryA
GetModuleHandleA
WriteFile
ReadProcessMemory
GetProcessHeap
GetModuleFileNameA
ExitProcess
MapViewOfFile
CreateFileA
UnmapViewOfFile
Sleep
CreateDirectoryA
SetLastError
GlobalFree
InterlockedDecrement
LocalFree
TerminateProcess
CreateMutexW
GetVolumeInformationA
EnterCriticalSection
LeaveCriticalSection
GetComputerNameA
HeapAlloc
GetCurrentProcess
HeapFree
CopyFileA
WriteProcessMemory
ole32
OleCreate
OleSetContainedObject
CoCreateInstance
CoCreateGuid
CoSetProxyBlanket
CoUninitialize
CoTaskMemAlloc
CoInitialize
user32
KillTimer
GetParent
UnhookWindowsHookEx
ScreenToClient
GetMessageA
PeekMessageA
GetCursorPos
GetClassNameA
PostQuitMessage
SetWindowsHookExA
DefWindowProcA
DispatchMessageA
GetWindowThreadProcessId
SetTimer
SendMessageA
GetWindowLongA
GetSystemMetrics
TranslateMessage
ClientToScreen
CreateWindowExA
GetWindow
FindWindowA
SetWindowLongA
DestroyWindow
RegisterWindowMessageA
oleaut32
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
GetUserNameA
RegDeleteKeyA
DuplicateTokenEx
RegDeleteValueA
SetTokenInformation
RegSetValueExA
OpenProcessToken
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ