Static task
static1
Behavioral task
behavioral1
Sample
212a36f10e7768aad231ccd6186f61c4_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
212a36f10e7768aad231ccd6186f61c4_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
212a36f10e7768aad231ccd6186f61c4_JaffaCakes118
-
Size
121KB
-
MD5
212a36f10e7768aad231ccd6186f61c4
-
SHA1
38a09c0c8f8e0b6a14de5b6185e9d4659b171a27
-
SHA256
ee07f46b84dc5fca272fbb81f6b5b22eb9ed95ac5ddb755e6f0cbf04d9372e16
-
SHA512
0731e8e19c552f5e5eb3e3a58eacfb7de32f342b3674824f5f50340bc594672b1926be2c30a552c28380b34eeda590100e7a591c101eb850e455d3a4cff98690
-
SSDEEP
3072:BYWjpfbrxv0Diz+d56CgjMuxDuNscTOonsGZZUZm3v/Oi+2q9QO5OFgOXYCdkV6s:BYW1fl0+E56CIDuyciosrknPq9f5OFgB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 212a36f10e7768aad231ccd6186f61c4_JaffaCakes118
Files
-
212a36f10e7768aad231ccd6186f61c4_JaffaCakes118.dll windows:4 windows x86 arch:x86
999096076e9307b6c2f2f06d5851ca7c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LocalFree
FormatMessageW
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GlobalAlloc
lstrcmpA
GlobalLock
GetProcAddress
FormatMessageA
MultiByteToWideChar
GlobalDeleteAtom
GlobalAddAtomA
Sleep
CreateEventA
GetVersionExA
HeapAlloc
RtlZeroMemory
GetLocaleInfoA
LocalReAlloc
GetPrivateProfileStringA
lstrcmpiA
GetProfileStringA
SetEvent
CreateThread
LoadLibraryA
ExitProcess
SearchPathA
lstrcatA
GlobalUnlock
GlobalFree
LocalAlloc
InitializeCriticalSection
GetModuleHandleA
lstrcpyA
GetLocalTime
GetOEMCP
GetProcessHeap
SetLastError
GetSystemTimeAsFileTime
lstrcmpW
FreeLibrary
SizeofResource
GetLastError
EnterCriticalSection
LeaveCriticalSection
lstrlenA
lstrlenW
InterlockedDecrement
HeapFree
InterlockedIncrement
VirtualFree
GlobalSize
GlobalHandle
LoadResource
MulDiv
VirtualProtect
user32
LoadAcceleratorsA
CopyAcceleratorTableA
InflateRect
IntersectRect
MoveWindow
InvalidateRect
GetDialogBaseUnits
CharPrevA
GetWindowThreadProcessId
wvsprintfA
ClientToScreen
ReleaseDC
GetWindowLongA
SendMessageA
GetMenu
EnableMenuItem
IsWindowVisible
IsRectEmpty
GetSystemMetrics
SetRect
AdjustWindowRect
ShowWindow
BringWindowToTop
SetActiveWindow
IsIconic
SetCursor
SetParent
SetWindowPos
IsWindow
GetSubMenu
DispatchMessageA
MessageBoxW
WinHelpA
EnableWindow
MapWindowPoints
OffsetRect
CreateWindowExA
DestroyWindow
GetWindow
UpdateWindow
GetKeyState
GetAsyncKeyState
RegisterClipboardFormatA
LoadImageA
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
RedrawWindow
SetWindowsHookA
GetMessageA
TranslateAcceleratorA
TranslateMessage
LoadStringW
SystemParametersInfoA
FindWindowA
SetForegroundWindow
SetRectEmpty
SetMenu
LoadIconA
ScreenToClient
InvertRect
GetDC
ReleaseCapture
CopyRect
GetWindowRect
GetParent
SetCapture
EndPaint
LoadStringA
GetClientRect
BeginPaint
DefWindowProcA
RegisterClassA
LoadCursorA
wsprintfA
PostMessageA
CallWindowProcA
SetWindowLongA
GetWindowTextA
DialogBoxParamA
SetFocus
GetDlgItem
GetFocus
EndDialog
LoadMenuA
SetWindowTextA
UnhookWindowsHook
CheckMenuItem
GetDesktopWindow
CreateMenu
DestroyMenu
GetSysColor
advapi32
RegCloseKey
SetServiceStatus
gdi32
CreateCompatibleDC
PatBlt
RealizePalette
GetDIBits
SelectPalette
DeleteDC
GetDeviceCaps
CreateBitmap
CreatePatternBrush
CreateSolidBrush
DeleteObject
GetStockObject
SelectObject
Rectangle
GetObjectA
CreateFontIndirectA
ole32
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
rpcrt4
RpcImpersonateClient
RpcRevertToSelf
msvcrt
_onexit
memmove
strstr
wcslen
memcpy
free
toupper
wcsstr
_vsnwprintf
_wtoi
_XcptFilter
_initterm
__dllonexit
memset
_lock
_unlock
_HUGE
realloc
malloc
_except_handler3
srand
rand
time
_adjust_fdiv
msvcp60
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAH@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
??0Init@ios_base@std@@QAE@XZ
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ