Static task
static1
Behavioral task
behavioral1
Sample
1502c8a4b4c30f71d0f99ea578ef7ecc_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1502c8a4b4c30f71d0f99ea578ef7ecc_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
1502c8a4b4c30f71d0f99ea578ef7ecc_JaffaCakes118
-
Size
136KB
-
MD5
1502c8a4b4c30f71d0f99ea578ef7ecc
-
SHA1
bdf0a04e211a4131642f976ee41803a93ec7601f
-
SHA256
2e6d0b3df2bb9d01562f589c6da18297574214d42ebb97c76b24519def24e236
-
SHA512
6ae89898d437bb8f14fb1416c506aa61182f52c22bf9f54518acf9be748fff343ee9e891fd3960c65fa12b554e45087eb2c40c5dfe5076d3e2d33db19857724c
-
SSDEEP
1536:m3mAiatAMVeeJzfq0wkiz++buR0Zl40YF/EX2XjJwv2VRntXom/M1h:ynVPAkiz+RQ49qSJ40ntXTM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1502c8a4b4c30f71d0f99ea578ef7ecc_JaffaCakes118
Files
-
1502c8a4b4c30f71d0f99ea578ef7ecc_JaffaCakes118.dll windows:4 windows x86 arch:x86
76e44273ae3fb63fd0741b8c19b0fb67
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
imagehlp
CheckSumMappedFile
kernel32
GetProcAddress
GetModuleHandleW
GetSystemDirectoryW
DeleteFileW
CopyFileW
lstrcatW
lstrcpyW
VerifyVersionInfoW
DeviceIoControl
FileTimeToSystemTime
SystemTimeToFileTime
GetWindowsDirectoryW
GetVolumeInformationW
GetVolumePathNameW
LocalFree
GetCurrentProcess
GetLastError
lstrcpyA
lstrcmpA
UnmapViewOfFile
CloseHandle
CreateFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
OutputDebugStringW
VerSetConditionMask
TlsAlloc
GetSystemTimeAsFileTime
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetModuleHandleA
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
ExitProcess
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualAlloc
HeapReAlloc
HeapSize
WriteFile
LoadLibraryA
InitializeCriticalSection
advapi32
GetNamedSecurityInfoW
SetEntriesInAclW
SetNamedSecurityInfoW
OpenProcessToken
FreeSid
LookupPrivilegeValueW
AdjustTokenPrivileges
RegSetValueExW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ