main
Static task
static1
Behavioral task
behavioral1
Sample
17b9bd7f07595748bbfd07d63441812a_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17b9bd7f07595748bbfd07d63441812a_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
17b9bd7f07595748bbfd07d63441812a_JaffaCakes118
-
Size
68KB
-
MD5
17b9bd7f07595748bbfd07d63441812a
-
SHA1
8913ca0f91632b2fa93b4e1b3b255028882da982
-
SHA256
83102ab27e6f5309606a4334d9febc61736a58e037e5bf56212d8c9648b10da5
-
SHA512
2e3a031729a357a6b6668d078a616874be6c06567b3ed28745a95f2012e2e0624f21c0a3b63800a49674e517dd73e7eab759508a6c5acb6708a1510928be2ef4
-
SSDEEP
1536:ttuzZStGbT5XZCcdjcUtxfb3SbWtmJxYW:yVJbTdZCcdjnthb3SbEmJxYW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17b9bd7f07595748bbfd07d63441812a_JaffaCakes118
Files
-
17b9bd7f07595748bbfd07d63441812a_JaffaCakes118.dll windows:4 windows x86 arch:x86
45041937014056b9ca663e381317287c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ReadFile
LocalAlloc
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
GetVersionExA
GetTickCount
FreeLibrary
GetProcAddress
LoadLibraryA
OpenEventA
SetErrorMode
LocalFree
CreateMutexA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreateFileA
GetLocalTime
CreateThread
GetCurrentProcessId
TerminateProcess
WriteFile
DisconnectNamedPipe
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
lstrcatA
GetProcessHeap
HeapAlloc
TerminateThread
lstrlenA
lstrcpyA
CreateProcessA
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
InitializeCriticalSection
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetLastError
user32
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
wsprintfA
CloseDesktop
advapi32
RegCreateKeyExA
RegSetValueExA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegDeleteValueA
GetUserNameA
RegDeleteKeyA
msvcrt
_initterm
_strnicmp
_adjust_fdiv
_strcmpi
??3@YAXPAX@Z
memcpy
memmove
ceil
_ftol
strlen
strstr
__CxxFrameHandler
memset
??2@YAPAXI@Z
memcmp
_CxxThrowException
strrchr
malloc
exit
_except_handler3
strcpy
strchr
strncat
strcat
atoi
strncpy
_beginthreadex
rand
sprintf
calloc
free
??1type_info@@UAE@XZ
ws2_32
select
closesocket
send
setsockopt
recv
sendto
WSASocketA
htonl
socket
gethostbyname
htons
inet_addr
connect
WSAIoctl
WSACleanup
WSAStartup
getsockname
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
avicap32
capGetDriverDescriptionA
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ