Static task
static1
Behavioral task
behavioral1
Sample
248eacc572fba4d1be3b248288c4a8f9_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
248eacc572fba4d1be3b248288c4a8f9_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
248eacc572fba4d1be3b248288c4a8f9_JaffaCakes118
-
Size
67KB
-
MD5
248eacc572fba4d1be3b248288c4a8f9
-
SHA1
0b1a7cd0cc7d28b431b1cb2599cbfb87941a8115
-
SHA256
1aa0305a6886ea8d17700f8d52b967b03215228dd40d6df826809a929bfba77a
-
SHA512
38674c391066510bfc9fa6997810cee533afb0ba390bdca0b7a96450573bf12b9e62447a1bac2b40a197c2db275d48dd57909da85e77965d4bcfd193cce863a9
-
SSDEEP
1536:WllmQ+AUysBBQARSVybqfN7dEQIrWGiO1MZGH0ChR6yr4glus:Wl/UysBBQSSkbqfdAruZGtf6I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 248eacc572fba4d1be3b248288c4a8f9_JaffaCakes118
Files
-
248eacc572fba4d1be3b248288c4a8f9_JaffaCakes118.dll windows:4 windows x86 arch:x86
d75e529a53cfc9469790a18d4394e07f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
RtlUnwind
RtlZeroMemory
strstr
_snprintf
memcmp
memcpy
strlen
kernel32
GetLastError
IsBadReadPtr
lstrcpynA
lstrcpyA
lstrcatA
WriteFile
CloseHandle
CreateRemoteThread
CreateThread
CreateToolhelp32Snapshot
GetCurrentProcessId
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
OpenProcess
Process32First
Process32Next
SystemTimeToFileTime
TerminateThread
WaitForSingleObject
lstrcmpiA
WideCharToMultiByte
lstrlenA
CreateFileA
CreateFileMappingA
CreateProcessA
DeleteFileA
GetExitCodeThread
GetFileSize
VirtualProtectEx
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
MapViewOfFile
MoveFileExA
ReadFile
UnmapViewOfFile
VirtualAlloc
VirtualFree
user32
EnumWindows
UnhookWindowsHookEx
SendMessageA
RegisterWindowMessageA
SetTimer
KillTimer
GetWindowThreadProcessId
wsprintfA
GetWindowTextA
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bd0 Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bd1 Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ