WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
167702756160e0349bc32056e84b748f_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
167702756160e0349bc32056e84b748f_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
167702756160e0349bc32056e84b748f_JaffaCakes118
-
Size
54KB
-
MD5
167702756160e0349bc32056e84b748f
-
SHA1
7dbc4c6b144af2aca5e31ffff5c5c4c3d619695d
-
SHA256
c10fca1d1b6f7789517548660b1163865d3e353b6865ff5af1205e38d6f15228
-
SHA512
f81d2fc6ae567f0e5c08abdd5825f516486053b935bb937a85af7655d8a37ee02598fc35726877a8871afd16e8a85f27d207f92baae48cbab9a7b35539398c42
-
SSDEEP
768:oLz2IkaWQ4TaxGbIqeoDYP1vnKA9p4v50vGax2Y0GMLGD1vQsQvjjzrWSBdRYuMk:Izpp55PVvKA05EYHhLG+7DP0YC6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 167702756160e0349bc32056e84b748f_JaffaCakes118
Files
-
167702756160e0349bc32056e84b748f_JaffaCakes118.dll windows:4 windows x86 arch:x86
80596183cef588772e6a355931ef6795
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord1980
ord2770
ord356
ord5683
ord2614
ord924
ord2784
ord668
ord6876
ord5710
ord4129
ord860
ord1615
ord5773
ord5442
ord4204
ord665
ord354
ord958
ord5186
ord539
ord2764
ord4202
ord5603
ord941
ord940
ord825
ord536
ord923
ord939
ord1105
ord6140
ord2061
ord858
ord4277
ord922
ord538
ord5572
ord2915
ord5858
ord537
ord341
ord654
ord540
ord2818
ord535
ord800
ord610
ord287
ord3575
ord5812
ord6394
ord6383
ord5440
ord5450
ord6139
ord823
ord2107
ord3663
ord2841
msvcrt
_adjust_fdiv
malloc
_initterm
free
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
__CxxFrameHandler
memmove
_access
exit
_mbsicmp
_mbscmp
_purecall
kernel32
SetLastError
GetModuleHandleA
GetVolumeInformationA
SetFileAttributesA
MoveFileExA
GetModuleFileNameA
ExpandEnvironmentStringsA
GetCurrentThreadId
GlobalFree
GlobalAlloc
ReleaseMutex
CloseHandle
CreateMutexA
WriteProcessMemory
IsBadReadPtr
GetCurrentDirectoryA
GetCurrentProcessId
Sleep
GetLastError
CreateFileA
GetProcAddress
DeleteFileA
FreeLibrary
MoveFileA
GetTickCount
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetTempPathA
GetSystemDirectoryA
SetFileTime
GetFileAttributesA
GetFileAttributesExA
OpenMutexA
WriteFile
LoadLibraryA
LeaveCriticalSection
GetTempFileNameA
ws2_32
send
recv
WSADuplicateSocketA
select
WSASocketA
WSAStartup
WSCEnumProtocols
WSCGetProviderPath
bind
inet_addr
htonl
gethostname
socket
connect
gethostbyname
ntohs
getpeername
getsockname
accept
closesocket
htons
__WSAFDIsSet
imagehlp
MapFileAndCheckSumA
Exports
Exports
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ