Static task
static1
Behavioral task
behavioral1
Sample
1851ad8c23bc3a7c28ae6c4e2253cb79_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1851ad8c23bc3a7c28ae6c4e2253cb79_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
1851ad8c23bc3a7c28ae6c4e2253cb79_JaffaCakes118
-
Size
20KB
-
MD5
1851ad8c23bc3a7c28ae6c4e2253cb79
-
SHA1
876ad5f5e5aa461ddb51b455400d246bdda6bb15
-
SHA256
63397f34cd779c97fa8f751fbc10e137406bde0c8793be004af48d3f291446fd
-
SHA512
b959a91fd7a2e5e16320569d84b579727047596a7e931ce9529744d64839cc4ca9b8690a57eede6b4712744ef213229e24c8187d3a4ff6a38265a3dbcb7d6fd3
-
SSDEEP
384:LbNV4JguTXQdjDBdj+dnITuToNhWcI5DP2kDnw85+:LbNVMBQFj+ddovqakDnN0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1851ad8c23bc3a7c28ae6c4e2253cb79_JaffaCakes118
Files
-
1851ad8c23bc3a7c28ae6c4e2253cb79_JaffaCakes118.dll windows:4 windows x86 arch:x86
41624a3ac412880d82c27b5ec224a948
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalLock
GlobalAlloc
GetCommandLineA
Sleep
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
GetModuleHandleA
DeleteFileA
CreateFileA
WriteFile
GetFileSize
GlobalFree
VirtualProtectEx
ReadProcessMemory
GetCurrentProcess
SetThreadPriority
IsBadReadPtr
GlobalUnlock
VirtualAlloc
VirtualFree
ExitProcess
Thread32Next
TerminateThread
GetThreadPriority
Thread32First
GetWindowsDirectoryA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleFileNameA
OpenEventA
CreateEventA
CreateThread
ReadFile
CloseHandle
user32
UnhookWindowsHookEx
wsprintfA
GetMessageA
PostThreadMessageA
SetWindowsHookExA
CallNextHookEx
GetInputState
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ