ey9v52d2.oze
Static task
static1
Behavioral task
behavioral1
Sample
24c1636d23eced9997159f59dfe21b63_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
24c1636d23eced9997159f59dfe21b63_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
24c1636d23eced9997159f59dfe21b63_JaffaCakes118
-
Size
509KB
-
MD5
24c1636d23eced9997159f59dfe21b63
-
SHA1
32504356528c1231ecdc6e485b8af24bad9f79df
-
SHA256
72d70ed3f969bf9cc9b4121f46cd30b46e73bf346c8f8142cc4939b611391d04
-
SHA512
8c0695084296d761561d81d1c1d6ae10e3b79fed4aa1d99ba27c3f86d53be4af1ab6c91382de7065d9153c80000bfb2aab487a507d8e1fb8803270cf685dbd12
-
SSDEEP
6144:ROaCIWMr7qQp0XhA79PdPkL8HT1FCTurrCfpX4kBSc1eRjgbOqrtMXC8OdYHXo0i:mJMrPpGhFcTkuCf3SXg6qRMX5o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24c1636d23eced9997159f59dfe21b63_JaffaCakes118
Files
-
24c1636d23eced9997159f59dfe21b63_JaffaCakes118.dll windows:4 windows x86 arch:x86
2bfa7a606b7aa3ec95773abce14e3580
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InterlockedCompareExchange
RtlUnwind
UnmapViewOfFile
ConnectNamedPipe
DeleteTimerQueueTimer
lstrcpyW
SetUnhandledExceptionFilter
GetEnvironmentStringsW
SetEvent
CreateThread
GetACP
DuplicateHandle
WaitForSingleObject
CreateEventA
LoadLibraryA
UnhandledExceptionFilter
GetModuleHandleA
FreeEnvironmentStringsW
HeapDestroy
GetOEMCP
QueryPerformanceCounter
HeapFree
GetLastError
GetModuleFileNameA
WaitForMultipleObjects
GetLocaleInfoA
VirtualQuery
GetCPInfo
GetCurrentProcessId
WideCharToMultiByte
TerminateProcess
WriteFile
GetCurrentThreadId
DeleteCriticalSection
GetSystemTimeAsFileTime
VirtualProtect
FreeEnvironmentStringsA
ReleaseMutex
GetTickCount
CreateTimerQueueTimer
HeapAlloc
LCMapStringA
CreateMutexW
MultiByteToWideChar
EnterCriticalSection
GetSystemInfo
IsBadWritePtr
GetVersionExA
InitializeCriticalSection
SetLastError
InterlockedDecrement
GetStartupInfoA
InterlockedExchangeAdd
ResetEvent
GetStdHandle
InterlockedExchange
LeaveCriticalSection
CreateNamedPipeA
GetFileType
DisconnectNamedPipe
lstrcatW
Sleep
OpenProcess
IsBadCodePtr
CopyFileA
LCMapStringW
IsBadReadPtr
GetEnvironmentStrings
user32
DrawIcon
CreateIconFromResource
wsprintfW
LoadIconA
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Exports
Exports
kmluf
Sections
.text Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 429KB - Virtual size: 458KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ