Static task
static1
Behavioral task
behavioral1
Sample
17a2e6708cbaf24ea0c30cdaa92b13bb_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17a2e6708cbaf24ea0c30cdaa92b13bb_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
17a2e6708cbaf24ea0c30cdaa92b13bb_JaffaCakes118
-
Size
108KB
-
MD5
17a2e6708cbaf24ea0c30cdaa92b13bb
-
SHA1
060ac4832f7c1a83e481237c972f978bc5f3186a
-
SHA256
d55d2dcd68653021c5249a2649f1462e215551f285dd93414331435329bca676
-
SHA512
67ba0d5d8b96ecc0358f12c902cca0892050bf2b3c466a5f0e2993e8187c5f9bb3bfdc378f73a7995e466d65cd3450388572ad70b43003a75d741f27f938c574
-
SSDEEP
1536:PwNIJNOG0FYwI+uJgdIHbPrREkpe3GlAk5Ul3k7/JFeOpVspfWFBH2O:o6cY1JgGH6klAkil0DJFrpVsW9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17a2e6708cbaf24ea0c30cdaa92b13bb_JaffaCakes118
Files
-
17a2e6708cbaf24ea0c30cdaa92b13bb_JaffaCakes118.dll windows:4 windows x86 arch:x86
9c5236d9b6cce96d022fd6b694590be9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
UpdateWindow
TranslateMessage
ShowWindow
SetUserObjectSecurity
SetSystemCursor
SetRect
RemoveMenu
RegisterShellHookWindow
RegisterClassA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
LoadIconA
GetTopWindow
GetKeyState
GetForegroundWindow
EnumPropsA
EmptyClipboard
DispatchMessageA
DialogBoxParamA
CharLowerW
CharToOemA
CreateWindowExA
DefWindowProcA
DestroyWindow
CharLowerBuffA
advapi32
GetOverlappedAccessResults
TraceEventInstance
SystemFunction008
SetUserFileEncryptionKey
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LsaSetInformationTrustedDomain
LsaQueryTrustedDomainInfo
LsaClearAuditLog
IsValidSid
InitializeSecurityDescriptor
GetTrusteeNameW
GetSecurityDescriptorDacl
GetAce
CryptGetHashParam
ConvertAccessToSecurityDescriptorW
BuildExplicitAccessWithNameW
AddAccessDeniedAce
kernel32
GetTempPathW
GetSystemInfo
GetWindowsDirectoryA
GetModuleHandleA
GetLogicalDriveStringsW
GetFileAttributesExA
HeapAlloc
HeapCreate
HeapFree
GetTimeZoneInformation
LocalShrink
GetConsoleMode
MulDiv
OpenJobObjectW
ReadFile
RemoveDirectoryW
SetEnvironmentVariableA
WaitForMultipleObjectsEx
lstrcatA
IsProcessorFeaturePresent
GetVersionExA
GetCurrentProcessId
GetDriveTypeW
GetEnvironmentStringsA
GetProcessWorkingSetSize
BeginUpdateResourceA
ClearCommBreak
CloseHandle
CreateFileA
CreateRemoteThread
CreateSemaphoreA
DeleteCriticalSection
DuplicateHandle
EnumTimeFormatsA
EraseTape
ExitProcess
FormatMessageA
GetCommandLineA
GetConsoleOutputCP
GetExitCodeProcess
winmm
waveOutUnprepareHeader
waveOutRestart
timeKillEvent
auxOutMessage
joyGetPos
midiOutCacheDrumPatches
waveInReset
mmioInstallIOProcA
mixerGetLineInfoA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
ole32
PropVariantClear
IsEqualGUID
StgPropertyLengthAsVariant
dinput
DirectInputCreateW
ws2_32
listen
WSAStringToAddressA
WSAUnhookBlockingHook
closesocket
connect
gethostbyname
htons
WSAGetLastError
socket
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ