isaHelpclass
Static task
static1
Behavioral task
behavioral1
Sample
177f6d9bfcf1212cca1620e9952d035c_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
177f6d9bfcf1212cca1620e9952d035c_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
177f6d9bfcf1212cca1620e9952d035c_JaffaCakes118
-
Size
144KB
-
MD5
177f6d9bfcf1212cca1620e9952d035c
-
SHA1
ec0acbabbab67a5d441bd6051cf4a2232f1b8050
-
SHA256
e098572527d5b097c6dac94411d824d83ed35efd17f2ea4cd978a55e7c44a5ab
-
SHA512
16bdd0ad42fab1f169504c0e2f0a89817180ffb8e98d5c576a692c093cd3caa94df83e1023d8607ac2aaeb91109648eada0c864fae8b08d9197cb5034cdb2e55
-
SSDEEP
3072:f2O/gCCmjbSgNUcx0nB6Se041JqluVcuTnyVZw5UXuSewEMzid+FieqV6y7:uO/1XSyzPhx1FVjTQ+WbDiddAy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 177f6d9bfcf1212cca1620e9952d035c_JaffaCakes118
Files
-
177f6d9bfcf1212cca1620e9952d035c_JaffaCakes118.dll windows:4 windows x86 arch:x86
cfe3c5a146acd2b002149397400cb34d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
InterlockedCompareExchange
InterlockedIncrement
OpenFileMappingA
Sleep
GetCommandLineA
CopyFileA
TerminateProcess
LoadLibraryA
CreateProcessA
CreateMutexW
CreateFileMappingA
HeapFree
GetModuleHandleA
WriteProcessMemory
ReadProcessMemory
GlobalFree
MapViewOfFile
CloseHandle
OpenEventA
GlobalAlloc
UnmapViewOfFile
HeapAlloc
GetComputerNameA
EnterCriticalSection
LeaveCriticalSection
LocalFree
GetVolumeInformationA
GetModuleFileNameA
GetCurrentProcess
ExitProcess
CreateFileA
InterlockedDecrement
SetLastError
WriteFile
GetTickCount
CreateDirectoryA
GetProcessHeap
GetProcAddress
WaitForSingleObject
CreateEventA
ole32
CoTaskMemAlloc
CoCreateGuid
OleSetContainedObject
CoCreateInstance
CoInitialize
OleCreate
CoSetProxyBlanket
CoUninitialize
user32
GetMessageA
RegisterWindowMessageA
GetWindowLongA
SetWindowsHookExA
GetCursorPos
KillTimer
PeekMessageA
SetTimer
ScreenToClient
SendMessageA
DestroyWindow
SetWindowLongA
CreateWindowExA
FindWindowA
TranslateMessage
GetWindow
PostQuitMessage
UnhookWindowsHookEx
DefWindowProcA
DispatchMessageA
GetSystemMetrics
GetClassNameA
ClientToScreen
GetWindowThreadProcessId
GetParent
oleaut32
SysStringLen
SysAllocString
SysFreeString
SysAllocStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
OpenProcessToken
SetTokenInformation
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
GetUserNameA
RegSetValueExA
DuplicateTokenEx
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ