Static task
static1
Behavioral task
behavioral1
Sample
2536ddba9ce002dc700f510ae851e501_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2536ddba9ce002dc700f510ae851e501_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
2536ddba9ce002dc700f510ae851e501_JaffaCakes118
-
Size
26KB
-
MD5
2536ddba9ce002dc700f510ae851e501
-
SHA1
948cd75e77793d205dbf9f01ef592dc745b69114
-
SHA256
5c96e579b80e0d59fa668848c52a13b3c5ccbdd694c211353fdca428fcaee013
-
SHA512
5a184bd312620d4c20473fd03b706a37c2473e708062141b3957676fc1e02e3b7308f46d033623e4ed60ce10f56311949f74db2ea0f23b96c0dd5b0fdfb1ab86
-
SSDEEP
384:PXpUsMh8BXJDPFZ1DAjYIcW+5ltOBDLPxKBJg2Molq6BThaUnuOJJ:555dDAjYL5ltwDQJ9/Bst+J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2536ddba9ce002dc700f510ae851e501_JaffaCakes118
Files
-
2536ddba9ce002dc700f510ae851e501_JaffaCakes118.dll windows:4 windows x86 arch:x86
0ff30caed263663f42f673c8f9aa314f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
ReadProcessMemory
WideCharToMultiByte
MultiByteToWideChar
IsBadReadPtr
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
SetThreadContext
OpenThread
GlobalAlloc
GetCurrentThread
GetCommandLineA
GetModuleFileNameA
WriteProcessMemory
GlobalLock
GlobalUnlock
GlobalFree
TerminateThread
CreateFileA
ReadFile
CloseHandle
CreateThread
Sleep
ExitProcess
GetCurrentProcessId
CreateMutexA
SetUnhandledExceptionFilter
GetLastError
user32
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
msvcrt
free
_stricmp
_initterm
malloc
_adjust_fdiv
_strlwr
_strnicmp
strrchr
wcslen
strcmp
strcat
sprintf
strcpy
memset
strlen
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
strncpy
strchr
strstr
fclose
fread
fopen
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ