Static task
static1
Behavioral task
behavioral1
Sample
23d50946c13315ff0cf71d62130c763e_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23d50946c13315ff0cf71d62130c763e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
23d50946c13315ff0cf71d62130c763e_JaffaCakes118
-
Size
15KB
-
MD5
23d50946c13315ff0cf71d62130c763e
-
SHA1
3d7fb946f540e9491113a2dfa1fcda162cc723c3
-
SHA256
e56e26b08cac6af9b05604013d20d76c79a2428d83ab8c8149e46d353cccc9e1
-
SHA512
2ffb24cc1be930be490985ae2ca1063a33bb50355101b56d22ca2e7f55ca0ac6010421e02d3a8839b20d12b2ca93fbaa83579b04e803950d90301d764324bea6
-
SSDEEP
192:U8ydPdoRiMTaCUunbOTjS3AuBFR47VAj+hTdHy3ISxRE0DzktF/t:Lo1CU8bOTjS3AAsyzEaAtF/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23d50946c13315ff0cf71d62130c763e_JaffaCakes118
Files
-
23d50946c13315ff0cf71d62130c763e_JaffaCakes118.dll windows:4 windows x86 arch:x86
424cb4b9b0bbd3107305fb04aa41a728
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
GetModuleHandleA
DeleteFileA
CreateFileA
WriteFile
OpenEventA
Sleep
GetFileSize
ReadFile
GetModuleFileNameA
VirtualProtectEx
ReadProcessMemory
GlobalFree
VirtualFreeEx
GlobalAlloc
GetCurrentProcess
CreateEventA
SetThreadPriority
CreateThread
OutputDebugStringA
CopyFileA
GetCurrentThread
GetCurrentProcessId
IsBadReadPtr
GetPrivateProfileStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
CreateRemoteThread
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
VirtualFree
GlobalLock
VirtualAlloc
RtlUnwind
user32
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
FindWindowA
GetWindowTextA
GetCursor
DestroyMenu
DestroyWindow
wsprintfA
GetMessageA
PostThreadMessageA
GetInputState
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ