Static task
static1
Behavioral task
behavioral1
Sample
15ff32ed8dd7db753ce4446d36489d45_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
15ff32ed8dd7db753ce4446d36489d45_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
15ff32ed8dd7db753ce4446d36489d45_JaffaCakes118
-
Size
21KB
-
MD5
15ff32ed8dd7db753ce4446d36489d45
-
SHA1
91d60f3f06de847b62f9f7748ee2a5399e5e27fe
-
SHA256
c3361ddf1d047149e07716a647f68fa33cec452b86927a1065d67cefcf7dbaa7
-
SHA512
450b7d4c99bf3eb4d639ebd348f07df4d507a90697d17a011510e90a991eb45d4e59d5f52f9755c33b3eaf6653f69a28d682df4b91efd6e4c7512a82fdda7b84
-
SSDEEP
192:fY+nerSFSs8CQryHB3mrTS5CUD0IrXBnShDuzXDmaWIVDxQY+u9buRWuDdKf1XZG:f58DyITSxLBShDuvvDxQ5u0RWSdKZI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15ff32ed8dd7db753ce4446d36489d45_JaffaCakes118
Files
-
15ff32ed8dd7db753ce4446d36489d45_JaffaCakes118.dll windows:4 windows x86 arch:x86
62eaa37f03c4e1e3f09c981392c11c46
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CreateMutexA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
FindFirstFileA
VirtualProtectEx
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
TerminateProcess
ReleaseMutex
Module32Next
Module32First
ReadFile
GetModuleFileNameA
WinExec
CreateThread
Sleep
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetSystemDirectoryA
lstrlenA
GetModuleHandleA
GetProcAddress
WriteFile
CloseHandle
GetTempPathA
GetCurrentProcess
GetTickCount
user32
EnumWindows
GetWindowThreadProcessId
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
wsprintfA
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
shlwapi
StrStrIA
wininet
InternetCloseHandle
msvcrt
_itoa
??2@YAPAXI@Z
memcpy
strcmp
_purecall
strstr
strncat
strcat
strlen
memset
strcpy
??3@YAXPAX@Z
memcmp
Sections
.bss Size: - Virtual size: 13KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ