Static task
static1
Behavioral task
behavioral1
Sample
1b41c8649bc0890d0e4c09784667c66a_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b41c8649bc0890d0e4c09784667c66a_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
1b41c8649bc0890d0e4c09784667c66a_JaffaCakes118
-
Size
282KB
-
MD5
1b41c8649bc0890d0e4c09784667c66a
-
SHA1
88950acd23c1a01a5fd78af40a3e79397d3fb016
-
SHA256
02299f84df371b28155939c930d55e72a54cda7d70cfb9bc18250b9f86205d77
-
SHA512
87a7644db92a1101c98dab961a53accfe16d6b7115fa0b5761ab9876b0c0dd21b2c66127f6d7fdac7afa115904a8f158ff6d317a979cdee292fe7d2a48b7a71b
-
SSDEEP
6144:gf89znVHd6urMCkHiFOFUw+HBu5QnQzRkiwOF7tiNzZ7zEG1n0a9Q:gf2d6oMCkHiFOFUwKOQnQFpVF7tK99Rq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b41c8649bc0890d0e4c09784667c66a_JaffaCakes118
Files
-
1b41c8649bc0890d0e4c09784667c66a_JaffaCakes118.dll windows:4 windows x86 arch:x86
43ab5370d734481b7b468271d283b822
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
OutputDebugStringA
IsBadReadPtr
OpenProcess
GetPrivateProfileIntA
FindClose
FindNextFileA
FindFirstFileA
VirtualQuery
lstrlenA
CreateDirectoryA
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetModuleHandleA
WritePrivateProfileStringA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
GetCommandLineA
lstrcpynA
GetFileSize
lstrcpyA
GlobalFree
GlobalReAlloc
GlobalAlloc
VirtualProtect
InterlockedIncrement
CreateMutexA
SetFileTime
GetFileTime
SetFileAttributesA
GetVersion
ReadProcessMemory
WideCharToMultiByte
MultiByteToWideChar
lstrcatA
IsBadStringPtrA
WriteProcessMemory
ExitProcess
TerminateThread
HeapAlloc
GetProcessHeap
Process32Next
Process32First
GetLastError
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
VirtualAllocEx
Module32Next
Module32First
GetSystemDirectoryA
OpenMutexA
InitializeCriticalSection
DeviceIoControl
Sleep
WinExec
GetTempFileNameA
LocalFree
GetPrivateProfileStringA
MoveFileA
GetTempPathA
GetFileAttributesA
CreateFileA
GetTickCount
WriteFile
CloseHandle
ReadFile
SetFilePointer
DeleteFileA
GetModuleFileNameA
InterlockedDecrement
CreateThread
user32
MessageBoxA
GetWindowTextA
wvsprintfA
GetDlgItem
GetKeyboardState
MapVirtualKeyA
FindWindowA
ToAscii
GetWindowRect
SetWindowTextA
GetWindowThreadProcessId
IsWindowVisible
GetDlgCtrlID
GetParent
GetWindow
GetWindowLongA
GetFocus
SetWindowLongA
GetKeyState
GetForegroundWindow
EnumThreadWindows
GetClassNameA
FindWindowExA
CreateWindowExA
IsWindow
SendMessageA
CallWindowProcA
SetFocus
wsprintfA
VkKeyScanA
gdi32
CreateFontA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CreateServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
ControlService
shell32
StrRStrIA
ole32
OleRun
CoCreateInstance
CoInitialize
oleaut32
GetErrorInfo
SysFreeString
VariantInit
VariantClear
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
shlwapi
PathFileExistsA
msvcrt
??1type_info@@UAE@XZ
wcsstr
_strlwr
strncmp
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strcmpi
_itoa
_strrev
_CxxThrowException
wcslen
wcsncpy
time
rand
isalnum
srand
memchr
_local_unwind2
??2@YAPAXI@Z
__CxxFrameHandler
memmove
??3@YAXPAX@Z
isdigit
free
strtol
strncpy
strstr
strchr
_except_handler3
atoi
_beginthread
strrchr
atol
strncat
sprintf
malloc
iphlpapi
GetAdaptersInfo
msvcp60
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBDI@Z
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xlen@std@@YAXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
ws2_32
closesocket
connect
WSARecv
getpeername
htons
send
inet_ntoa
recv
WSACleanup
urlmon
URLDownloadToFileA
netapi32
Netbios
Sections
.text Size: 209KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ