Static task
static1
Behavioral task
behavioral1
Sample
22f7a31e3d860bdc3b8ea4a3d7359d42_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
22f7a31e3d860bdc3b8ea4a3d7359d42_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
22f7a31e3d860bdc3b8ea4a3d7359d42_JaffaCakes118
-
Size
116KB
-
MD5
22f7a31e3d860bdc3b8ea4a3d7359d42
-
SHA1
218840f97def0116dabf6e6d3c40d0dd3c1f6f77
-
SHA256
911e4f08752cf050c26b6d443ae7563e16dec5f6f444ae8a59861cf0747da135
-
SHA512
6cbce0915f949088aa4923139def137cb426905fec28e103425f4a7f065a70e4acf61ce55f6ad7d7444113039a9e1be229f9fb78614406f09ad7c09ded3c2fd4
-
SSDEEP
3072:zWiiK2cU28IgaI0UsZOVJIbibUA3rQn4KM:zWijUlT90H0Yb8a4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22f7a31e3d860bdc3b8ea4a3d7359d42_JaffaCakes118
Files
-
22f7a31e3d860bdc3b8ea4a3d7359d42_JaffaCakes118.dll windows:4 windows x86 arch:x86
fcd116a47382448eae9f00d618a9513b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
gethostbyname
WSAUnhookBlockingHook
WSCDeinstallProvider
socket
htons
WSAGetLastError
connect
closesocket
winmm
PlaySoundW
WOW32DriverCallback
midiInStart
waveOutUnprepareHeader
waveOutRestart
waveInStart
waveInGetDevCapsA
timeKillEvent
timeBeginPeriod
mod32Message
mmioInstallIOProcA
midiOutSetVolume
ole32
PropVariantClear
IsEqualGUID
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
advapi32
BuildExplicitAccessWithNameW
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaSetInformationTrustedDomain
LsaRemoveAccountRights
LookupPrivilegeNameW
I_ScSetServiceBitsA
GetTrusteeNameW
GetSecurityDescriptorDacl
GetAclInformation
GetAce
FileEncryptionStatusA
AddAccessDeniedAce
user32
RegisterClassA
RegisterShellHookWindow
RegisterWindowMessageW
RemoveMenu
SetRect
SetSystemCursor
SetUserObjectSecurity
ShowWindow
TranslateMessage
UpdateWindow
PeekMessageA
GetKeyState
GetForegroundWindow
GetCaretPos
EnumPropsA
EmptyClipboard
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CharToOemA
CharLowerW
CharLowerBuffA
OpenClipboard
MsgWaitForMultipleObjects
GetTopWindow
MessageBoxW
BeginDeferWindowPos
kernel32
GetWindowsDirectoryA
GetVersionExA
GetTimeZoneInformation
GetTempPathW
GlobalAddAtomA
GetSystemDefaultLangID
GetStringTypeExA
GetPrivateProfileSectionW
GetModuleHandleA
GetFileAttributesExA
HeapAlloc
HeapCreate
MulDiv
OpenEventW
OpenJobObjectW
ReadFile
SetEnvironmentVariableA
SetFileTime
TlsGetValue
WaitForMultipleObjectsEx
lstrcmpA
GetBinaryTypeA
GetCommandLineA
GetConsoleAliasA
GetConsoleOutputCP
GetSystemInfo
GetCurrentProcessId
FormatMessageA
FlushConsoleInputBuffer
FindNextVolumeW
FindAtomW
FindAtomA
ExitProcess
EnumTimeFormatsA
DuplicateHandle
DeleteCriticalSection
CreateSemaphoreA
CloseHandle
BindIoCompletionCallback
Beep
shell32
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteA
dinput
DirectInputCreateW
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ