Static task
static1
Behavioral task
behavioral1
Sample
15bef939fc587ba5ec26a7604215798e_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
15bef939fc587ba5ec26a7604215798e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
15bef939fc587ba5ec26a7604215798e_JaffaCakes118
-
Size
23KB
-
MD5
15bef939fc587ba5ec26a7604215798e
-
SHA1
5efe8c3315a7100c18549769b4effbbae5f01bc3
-
SHA256
e8ca35c5c70e12941be070a6802e4a0fd607f76450347ddaa81127745a0271f0
-
SHA512
ba0ea00edae6592020837bebb29ff17bedc5f3cc1a8d7da18e8f7c5e5435b6593a4ea8eebf9114510601e8b1578c234948e8612c654ea67f6332e61826733bb5
-
SSDEEP
384:s6MU53mDSbWqb66ISNvuu6wllovSxEKXS6D/ksr20C2MyfQjJgZlJThwaY:jjZmu/lo6xhX7D/ksr20zfQjCj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15bef939fc587ba5ec26a7604215798e_JaffaCakes118
Files
-
15bef939fc587ba5ec26a7604215798e_JaffaCakes118.dll windows:4 windows x86 arch:x86
d3a46cca5e61843b0e16e857619cb4bd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
CreateMutexA
OpenMutexA
GetCurrentProcessId
GetProcAddress
LoadLibraryA
SetThreadContext
GetCurrentThread
SetUnhandledExceptionFilter
Process32Next
CloseHandle
CreateToolhelp32Snapshot
GetModuleFileNameA
WriteProcessMemory
IsBadReadPtr
ReadProcessMemory
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
TerminateThread
MultiByteToWideChar
WideCharToMultiByte
Sleep
CreateThread
VirtualProtectEx
GetCurrentProcess
Process32First
user32
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
fread
_stricmp
_adjust_fdiv
malloc
_initterm
free
strrchr
wcslen
strcat
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
memcpy
strncpy
strchr
strstr
fclose
_strlwr
fopen
memset
strcmp
sscanf
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ