Static task
static1
Behavioral task
behavioral1
Sample
1a3c88df2069ada8964b78b9bdac9fc5_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a3c88df2069ada8964b78b9bdac9fc5_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
1a3c88df2069ada8964b78b9bdac9fc5_JaffaCakes118
-
Size
132KB
-
MD5
1a3c88df2069ada8964b78b9bdac9fc5
-
SHA1
350b15026a04a3d19e08c9159abed99936a9e7fb
-
SHA256
e226a9e39656ea59326ccffd63be158f764d274efcb728974094836cb6ace250
-
SHA512
caac97357f8eeed17b117c31f6d512b737850c8900de6e43e0bbf637649aba7d24bd23d45a7059f84d22b822af3d1cbae8a03c2456446037bfc9db1ba39f8e78
-
SSDEEP
3072:3ffqwt4wIqYhb5tgGVTZO65z4PepoCDQV7xmM0pI56ghOjMFlkHGe2:3KweW00GhIL7MZI53Ojc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a3c88df2069ada8964b78b9bdac9fc5_JaffaCakes118
Files
-
1a3c88df2069ada8964b78b9bdac9fc5_JaffaCakes118.dll windows:4 windows x86 arch:x86
db3be9ed3f89fee9f055eb582ac1bc94
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetFileAttributesW
GetVersion
GlobalUnlock
Sleep
CreateThread
TryEnterCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
GetModuleFileNameW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GlobalSize
InterlockedExchange
ReleaseMutex
WaitForSingleObject
GetThreadLocale
GetVolumeInformationW
LocalAlloc
GetLocaleInfoW
InterlockedCompareExchange
GetModuleHandleW
GlobalAlloc
lstrcmpiW
TerminateProcess
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
GetLastError
lstrlenW
DisableThreadLibraryCalls
lstrcatW
lstrcpyW
LoadLibraryW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DeleteCriticalSection
SetLastError
lstrcpynW
FormatMessageW
LocalFree
IsBadReadPtr
FreeLibrary
LoadLibraryExW
GetSystemWindowsDirectoryW
OutputDebugStringA
VirtualProtect
GlobalFree
GetCommandLineA
CloseHandle
user32
LoadBitmapW
KillTimer
GetFocus
GetActiveWindow
SendDlgItemMessageW
IsDlgButtonChecked
LoadStringW
wsprintfW
MessageBoxW
LoadImageW
SetDlgItemTextW
WinHelpW
UpdateWindow
LoadIconW
ReleaseDC
DialogBoxParamW
GetWindow
GetDlgItemTextW
IsCharAlphaW
CheckRadioButton
GetDlgCtrlID
GetWindowContextHelpId
GetWindowTextLengthW
CheckDlgButton
ShowWindow
IsWindowEnabled
GetWindowRect
SendMessageW
InvalidateRect
GetClientRect
SetTimer
ValidateRect
SetWindowTextW
SetWindowLongW
SetFocus
EndDialog
GetWindowTextW
GetDlgItem
GetWindowLongW
RegisterClipboardFormatW
PostMessageW
GetParent
EnableWindow
SetWindowPos
MapWindowPoints
GetDC
advapi32
RegQueryValueExW
MakeSelfRelativeSD
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
ReportEventW
RegOpenKeyA
RegDeleteKeyW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
EqualSid
CopySid
InitializeSecurityDescriptor
AllocateAndInitializeSid
FreeSid
LsaFreeMemory
GetSecurityDescriptorControl
RegOpenKeyW
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
RegCloseKey
gdi32
DeleteObject
SelectObject
GetTextMetricsW
ole32
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
StringFromCLSID
ReleaseStgMedium
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
StringFromGUID2
CoTaskMemFree
msvcr71
_except_handler3
wcscpy
_adjust_fdiv
free
mbstowcs
wcstol
wcstoul
malloc
wcslen
_wcsnicmp
_initterm
wcsncpy
wcstombs
_onexit
_lock
__dllonexit
_unlock
_amsg_exit
_vsnwprintf
memcpy
_ultow
memset
_wcsicmp
wcschr
__CxxFrameHandler
_CxxThrowException
_XcptFilter
__CppXcptFilter
atoi
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ