aqtjnjmwq
Static task
static1
Behavioral task
behavioral1
Sample
16cc91a23c47f2eb6eecb8bcd59ff3eb_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16cc91a23c47f2eb6eecb8bcd59ff3eb_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
16cc91a23c47f2eb6eecb8bcd59ff3eb_JaffaCakes118
-
Size
576KB
-
MD5
16cc91a23c47f2eb6eecb8bcd59ff3eb
-
SHA1
6d4cff1d0d52f719b5ac50afeea5046d965b6d1b
-
SHA256
661548cec41aa38aa1374f5c868eff121b093bb15ee405c06fe8eb93b1138c0d
-
SHA512
2eee979b151cdd12b41d361b41268a9bb3324875f05b5f1349104262d536b642c291e80db621c75e9f9a1b94e6f551b4de1e430e4ace2dfd37c4fb8ad2309312
-
SSDEEP
12288:Hb+iGz5QCfeZkXMOjgS82XLhBFL/M8ABjrdSGI:qv9feZG/jV3FA8A1I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16cc91a23c47f2eb6eecb8bcd59ff3eb_JaffaCakes118
Files
-
16cc91a23c47f2eb6eecb8bcd59ff3eb_JaffaCakes118.dll windows:4 windows x86 arch:x86
28b608b28986391b1a5fcb5a69d0c666
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FileTimeToSystemTime
GetTimeZoneInformation
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
CompareStringW
CompareStringA
InterlockedExchange
HeapSize
RtlUnwind
InitializeCriticalSection
SetFilePointer
VirtualQuery
GetSystemInfo
VirtualProtect
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCPInfo
UnhandledExceptionFilter
SetEnvironmentVariableW
SetEnvironmentVariableA
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
FileTimeToLocalFileTime
WriteFile
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
DeleteCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
GetVersionExA
CreateThread
GetCurrentThreadId
ExitThread
GetFileAttributesA
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
FindClose
FindNextFileA
FindFirstFileA
GetExitCodeThread
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetLastError
FormatMessageA
LocalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
ReadDirectoryChangesW
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
ReadFile
Beep
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 544KB - Virtual size: 544KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ