ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
25e3bf82cde2b011acffdcdea2bd19e2_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25e3bf82cde2b011acffdcdea2bd19e2_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
25e3bf82cde2b011acffdcdea2bd19e2_JaffaCakes118
-
Size
68KB
-
MD5
25e3bf82cde2b011acffdcdea2bd19e2
-
SHA1
d740a645815ed0b7f90bdc11a732d476eb066b42
-
SHA256
ad8b4d08b474d31dd67ff01575ac4397e9058c97b655c5a3d9f95b310ab41d70
-
SHA512
ce77a684908e0d693e58fa1b730e47993ac11dee947695ee83ecf264bd1b4ed832e5d5a9eca5b74339058c3a704256d339aaa0739bbda894b4ba765fb6fef9b2
-
SSDEEP
768:Pb0pteDQ0fsIJHvC/a78lRHgRZcKIkCXEob56Wr1fb+IEK2AGJD6uw8lwv209clq:Iekwvj8lKRnNWIWr1tgI9clcn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25e3bf82cde2b011acffdcdea2bd19e2_JaffaCakes118
Files
-
25e3bf82cde2b011acffdcdea2bd19e2_JaffaCakes118.dll windows:4 windows x86 arch:x86
9514b7c971c3190fb05f654a50b33a8c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetWindowsDirectoryA
GlobalMemoryStatus
lstrcmpiA
GetVersionExA
GetCurrentProcessId
GetLastError
FindNextFileA
lstrcatA
lstrlenA
lstrcpyA
CreateProcessA
DuplicateHandle
GetCurrentProcess
CloseHandle
CreatePipe
DisconnectNamedPipe
WaitForMultipleObjects
TerminateProcess
TerminateThread
CreateThread
WriteFile
GetSystemDirectoryA
ReadFile
GetFileSize
CreateFileA
OpenProcess
ExitThread
PeekNamedPipe
GetTickCount
GetProcAddress
LoadLibraryA
SetFileTime
GetFileTime
GetCurrentThread
CreateMutexA
GetDriveTypeA
GetVolumeInformationA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetLocalTime
WinExec
CreateDirectoryA
FindFirstFileA
FindClose
SetCurrentDirectoryA
Sleep
GetCurrentDirectoryA
WaitForSingleObject
GetComputerNameA
user32
wsprintfA
ExitWindowsEx
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerA
RegCreateKeyA
OpenProcessToken
GetUserNameA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueA
LookupAccountSidA
shell32
SHFileOperationA
SHGetFileInfoA
ShellExecuteA
msvcrt
_strnicmp
_stricmp
_strlwr
_adjust_fdiv
_initterm
_onexit
malloc
memset
sprintf
strlen
strcpy
_except_handler3
_local_unwind2
fflush
_iob
printf
memcpy
strcat
strncpy
atoi
system
free
_snprintf
fclose
fread
ftell
fseek
fopen
strstr
strcmp
_errno
wcstombs
rand
srand
time
strtok
strchr
fprintf
strncat
memcmp
??3@YAXPAX@Z
__dllonexit
_strdup
ws2_32
socket
listen
bind
setsockopt
inet_addr
htonl
htons
connect
closesocket
WSAStartup
send
sendto
accept
gethostname
WSASocketA
WSAGetLastError
WSAIoctl
recvfrom
getsockname
getpeername
ntohs
inet_ntoa
shutdown
select
__WSAFDIsSet
recv
ioctlsocket
gethostbyname
ntdll
ZwQuerySystemInformation
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
DeleteUrlCacheEntry
InternetOpenA
Exports
Exports
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ