ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
2259d38e5f044af59cb9469b963f6e04_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2259d38e5f044af59cb9469b963f6e04_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
2259d38e5f044af59cb9469b963f6e04_JaffaCakes118
-
Size
179KB
-
MD5
2259d38e5f044af59cb9469b963f6e04
-
SHA1
c87b4ed88a4b48a6c49b459f8e5e155bfaff4773
-
SHA256
6bf858ebd532cc9d38ee698a02ae72fcf83b0717c4f51b11665b06633a3ab279
-
SHA512
600c7842a80d09f7e81ca1c217111da0a8d6dda6ac86f0a365028f8a322e985902168a6945ab26bcefe9c7b10c3fdf31fc868822129c0b3d33c4447881a7c94d
-
SSDEEP
3072:nR/IPQp8WSgoGXaO6WuqdyCxNcndnf9U/yijPVoqEn:nRgPQp8WSVgaO6WuWEV9KrPV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2259d38e5f044af59cb9469b963f6e04_JaffaCakes118
Files
-
2259d38e5f044af59cb9469b963f6e04_JaffaCakes118.dll windows:4 windows x86 arch:x86
4dea9cadd70129a2709d1edec738c2c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpyA
GetTickCount
GetTempPathA
FreeLibrary
LocalFree
MapViewOfFile
UnmapViewOfFile
GetVersionExA
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GlobalAlloc
InitializeCriticalSection
ReadFile
GetFileSize
SetFilePointer
WriteFile
CreateFileMappingA
CreateFileA
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
MoveFileA
lstrcatA
GetSystemDirectoryA
DeviceIoControl
lstrcatW
GetSystemDirectoryW
lstrcmpiW
GetModuleFileNameW
IsBadWritePtr
LockResource
SizeofResource
LoadResource
FindResourceA
lstrlenW
lstrcpyW
CreateFileW
TerminateJobObject
AssignProcessToJobObject
CreateJobObjectA
LoadLibraryExA
Sleep
InterlockedExchange
RtlUnwind
GlobalFree
OpenProcess
GetStartupInfoA
CreateProcessA
CloseHandle
GetCurrentProcess
GetModuleFileNameA
lstrlenA
GetCurrentThreadId
CreateEventA
GetLastError
CreateThread
LoadLibraryW
GetProcAddress
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
GetSystemTime
ExitProcess
VirtualQuery
user32
wsprintfW
wsprintfA
GetInputState
PeekMessageA
PostThreadMessageA
advapi32
CreateServiceA
OpenSCManagerA
OpenServiceA
StartServiceA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
CreateProcessAsUserA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CloseServiceHandle
SetServiceStatus
RegisterServiceCtrlHandlerW
RegQueryValueExA
ws2_32
htons
socket
connect
inet_ntoa
gethostbyname
gethostname
WSAStartup
send
closesocket
inet_addr
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ