Static task
static1
Behavioral task
behavioral1
Sample
2768e2e6a8f0b13cbb50762623e11531_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2768e2e6a8f0b13cbb50762623e11531_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2768e2e6a8f0b13cbb50762623e11531_JaffaCakes118
-
Size
85KB
-
MD5
2768e2e6a8f0b13cbb50762623e11531
-
SHA1
19426e4f8afaa74a09289277aa0cb16ae76795ef
-
SHA256
71c343320de81eb91a394bbc52d0d604f106164eca37b3b53a8b6d3fa3d80d74
-
SHA512
808ead5ced744204b2433c22a56431d06b4b0884104a99cc87504988a8ddd9fdb13dde28accf9df2c1f495823a3f2b8f29a09ce66f70b02fb2f27b464f0454e5
-
SSDEEP
1536:sVCyeUPaZRp0OCt0IxXjHE04Ptfn6WRWbXcQZ4eBr:sVnepZ/0ytfn6W43NBr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2768e2e6a8f0b13cbb50762623e11531_JaffaCakes118
Files
-
2768e2e6a8f0b13cbb50762623e11531_JaffaCakes118.dll windows:4 windows x86 arch:x86
fd073e9df625b4774576f956a66f30f9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
DispatchMessageA
DestroyMenu
DestroyCursor
DeleteMenu
DefDlgProcA
CreateMDIWindowA
CreateDialogIndirectParamA
CloseWindow
CharUpperA
CharPrevA
ChangeMenuA
BeginPaint
kernel32
GetCommandLineA
lstrcpynA
lstrcatA
VirtualAlloc
TlsFree
Sleep
SetEndOfFile
SetCurrentDirectoryA
OpenFileMappingA
LoadLibraryA
LeaveCriticalSection
GetVersion
GetTimeFormatA
CompareStringA
ExitProcess
ExitThread
FlushFileBuffers
FreeResource
GetDateFormatA
GetFileSize
GetLastError
GetPrivateProfileStringA
GetStartupInfoA
Sections
.text Size: 18KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ