Static task
static1
Behavioral task
behavioral1
Sample
19e9abf614b6e2515a2a8fcfb71b745e_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19e9abf614b6e2515a2a8fcfb71b745e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
19e9abf614b6e2515a2a8fcfb71b745e_JaffaCakes118
-
Size
132KB
-
MD5
19e9abf614b6e2515a2a8fcfb71b745e
-
SHA1
c2a42d9b0a9c3977352f03069ffd1d66a823a5f8
-
SHA256
00eb6b7b567b1b798b7c8f5b12af53dc0c5139766d41b342deb475a927c917ad
-
SHA512
093a15cead6900887579a382fac15fb42f613e32b5d8e606f6212fc299c3a262143b26873b75c9bdc94301e6764532580e8679f8a299bee0a12752d4510632ea
-
SSDEEP
3072:3ffqwt4wIqYhb5tg2UfGke5TsT6KmCACXuDQV7xmM0pI5AghOj+7FlkHGe2:3KweW002dJcP7MZI59Oj+R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19e9abf614b6e2515a2a8fcfb71b745e_JaffaCakes118
Files
-
19e9abf614b6e2515a2a8fcfb71b745e_JaffaCakes118.dll windows:4 windows x86 arch:x86
db3be9ed3f89fee9f055eb582ac1bc94
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetFileAttributesW
GetVersion
GlobalUnlock
Sleep
CreateThread
TryEnterCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
GetModuleFileNameW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GlobalSize
InterlockedExchange
ReleaseMutex
WaitForSingleObject
GetThreadLocale
GetVolumeInformationW
LocalAlloc
GetLocaleInfoW
InterlockedCompareExchange
GetModuleHandleW
GlobalAlloc
lstrcmpiW
TerminateProcess
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
GetLastError
lstrlenW
DisableThreadLibraryCalls
lstrcatW
lstrcpyW
LoadLibraryW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DeleteCriticalSection
SetLastError
lstrcpynW
FormatMessageW
LocalFree
IsBadReadPtr
FreeLibrary
LoadLibraryExW
GetSystemWindowsDirectoryW
OutputDebugStringA
VirtualProtect
GlobalFree
GetCommandLineA
CloseHandle
user32
LoadBitmapW
KillTimer
GetFocus
GetActiveWindow
SendDlgItemMessageW
IsDlgButtonChecked
LoadStringW
wsprintfW
MessageBoxW
LoadImageW
SetDlgItemTextW
WinHelpW
UpdateWindow
LoadIconW
ReleaseDC
DialogBoxParamW
GetWindow
GetDlgItemTextW
IsCharAlphaW
CheckRadioButton
GetDlgCtrlID
GetWindowContextHelpId
GetWindowTextLengthW
CheckDlgButton
ShowWindow
IsWindowEnabled
GetWindowRect
SendMessageW
InvalidateRect
GetClientRect
SetTimer
ValidateRect
SetWindowTextW
SetWindowLongW
SetFocus
EndDialog
GetWindowTextW
GetDlgItem
GetWindowLongW
RegisterClipboardFormatW
PostMessageW
GetParent
EnableWindow
SetWindowPos
MapWindowPoints
GetDC
advapi32
RegQueryValueExW
MakeSelfRelativeSD
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
ReportEventW
RegOpenKeyA
RegDeleteKeyW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
EqualSid
CopySid
InitializeSecurityDescriptor
AllocateAndInitializeSid
FreeSid
LsaFreeMemory
GetSecurityDescriptorControl
RegOpenKeyW
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
RegCloseKey
gdi32
DeleteObject
SelectObject
GetTextMetricsW
ole32
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
StringFromCLSID
ReleaseStgMedium
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
StringFromGUID2
CoTaskMemFree
msvcr71
_except_handler3
wcscpy
_adjust_fdiv
free
mbstowcs
wcstol
wcstoul
malloc
wcslen
_wcsnicmp
_initterm
wcsncpy
wcstombs
_onexit
_lock
__dllonexit
_unlock
_amsg_exit
_vsnwprintf
memcpy
_ultow
memset
_wcsicmp
wcschr
__CxxFrameHandler
_CxxThrowException
_XcptFilter
__CppXcptFilter
atoi
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ