Vout
Static task
static1
Behavioral task
behavioral1
Sample
266afae875ce51bd4d5efaea8b28e02a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
266afae875ce51bd4d5efaea8b28e02a_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
266afae875ce51bd4d5efaea8b28e02a_JaffaCakes118
-
Size
153KB
-
MD5
266afae875ce51bd4d5efaea8b28e02a
-
SHA1
fe294ab10890100ad6639633f5b352947f6aeafe
-
SHA256
317c9be9ba02753bd5ea9cdd839cf56d948a8c9477cfb7c8b1a154b7586f6dbc
-
SHA512
6f3e0245dfd8d0c0cb3ff8017c1f69179af6bd3e2d5c084dd4fe87ebc0b46956b25f24888bb8a17e31d916917bd2a12c95c14ea590493ca4f63f9bb3abb6256c
-
SSDEEP
3072:uJWFm5tB1s83gAn8S7ME4s5GMYtAMQYJglBrtT7TiewiA:uJWGtBeG6wUMYuJlPTXXdA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 266afae875ce51bd4d5efaea8b28e02a_JaffaCakes118
Files
-
266afae875ce51bd4d5efaea8b28e02a_JaffaCakes118.dll windows:4 windows x86 arch:x86
13fe52b2bfafd8a2b7903f7189158c2c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
GetCurrentThreadId
GetSystemDirectoryA
TerminateThread
SetFilePointer
ReadFile
CreateFileA
WriteProcessMemory
VirtualAllocEx
DeleteFileA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
MultiByteToWideChar
GetFullPathNameA
CopyFileA
GetFileSize
FlushFileBuffers
WriteFile
GetVersionExA
LockResource
LoadResource
SizeofResource
FindResourceA
VirtualProtectEx
SetThreadPriority
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
WideCharToMultiByte
GlobalFree
GetProcAddress
ReadProcessMemory
GetModuleHandleA
GlobalLock
GlobalAlloc
IsBadReadPtr
CloseHandle
GlobalSize
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CancelIo
InterlockedExchange
SetEvent
ResetEvent
lstrcpyA
lstrlenA
LocalAlloc
SetErrorMode
lstrcmpiA
lstrcatA
GetLocalTime
OutputDebugStringA
GlobalUnlock
GetPrivateProfileIntA
GetPrivateProfileStringA
GetComputerNameA
GetCurrentProcess
CreateThread
Sleep
OpenEventA
CreateEventA
GetTickCount
GetModuleFileNameA
user32
SetRect
wsprintfA
GetWindowTextA
FindWindowA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetInputState
PostThreadMessageA
GetMessageA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetClassNameA
ExitWindowsEx
BlockInput
keybd_event
MapVirtualKeyA
SetCapture
EnumChildWindows
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
WindowFromPoint
GetSystemMetrics
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
SendMessageA
GetForegroundWindow
ClientToScreen
GetClientRect
wininet
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
msvcrt
atoi
??2@YAPAXI@Z
strstr
??3@YAXPAX@Z
_CxxThrowException
_ftol
memmove
ceil
_beginthreadex
calloc
free
??1type_info@@UAE@XZ
__CxxFrameHandler
realloc
ws2_32
htons
gethostbyname
socket
connect
recv
ntohs
WSAStartup
WSACleanup
setsockopt
send
select
closesocket
gdi32
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetPaletteEntries
CreateHalftonePalette
SelectObject
Exports
Exports
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ