?EndKey@@YAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
27e0b9c114c11e9470bfd12a429e28d7_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
27e0b9c114c11e9470bfd12a429e28d7_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
27e0b9c114c11e9470bfd12a429e28d7_JaffaCakes118
-
Size
124KB
-
MD5
27e0b9c114c11e9470bfd12a429e28d7
-
SHA1
e8873aef3868bf119fbd35fe002b9c41eb5c76a3
-
SHA256
5d1cef9c56a2e46410fe8ac51d9d605a6ffd2e7f7d8e82b03fcd8f672998076f
-
SHA512
8a2e410210b95d4cb7af694c76fc04be8165d93958c0b34b04845962472d7b565bdcc4a064ce6bdef4803b7cadddf969456d080c1529a00339a310a8c1b515e2
-
SSDEEP
1536:Gd1ItPNIYvEjUGTXZQTGn/IRGX8+NeLLazvc1z/Xy38AXy1XEHkoV0LZJTWHbJb:GdwFIYcRTQm1hvc1d2y16ko6LZsbJb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27e0b9c114c11e9470bfd12a429e28d7_JaffaCakes118
Files
-
27e0b9c114c11e9470bfd12a429e28d7_JaffaCakes118.dll windows:4 windows x86 arch:x86
96e0c0168d9900a0d22dbed3ada947d7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemTime
GetLocalTime
RtlUnwind
ExitProcess
GetCommandLineA
HeapFree
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
SetStdHandle
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
LCMapStringA
LCMapStringW
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalAlloc
LocalFree
LocalReAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
GetProcessVersion
GlobalFlags
RaiseException
GetCurrentProcess
TerminateProcess
GlobalSize
GetFileSize
FindFirstFileA
FindNextFileA
HeapSize
FindClose
CreateToolhelp32Snapshot
Process32First
Process32Next
GetLogicalDriveStringsA
OpenProcess
GetDriveTypeA
GetModuleHandleA
GetDiskFreeSpaceA
lstrlenA
lstrcmpA
lstrcpynA
lstrcpyA
lstrcatA
FreeLibrary
CopyFileA
MoveFileA
DeleteFileA
WaitForSingleObject
WinExec
CreateThread
LoadLibraryA
GetProcAddress
GetVersion
GetModuleFileNameA
SetFilePointer
CreateFileA
GlobalReAlloc
GetSystemDirectoryA
Sleep
DeviceIoControl
ReadFile
ResetEvent
WriteFile
GetOverlappedResult
CreateEventA
CloseHandle
GlobalAlloc
GlobalLock
CreateFileW
GetLastError
GlobalHandle
GlobalUnlock
VirtualFree
GlobalFree
user32
GetCapture
MessageBoxA
GetTopWindow
EnableWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
IsWindowEnabled
LoadCursorA
GetSysColorBrush
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
WinHelpA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
LoadStringA
UnhookWindowsHookEx
DispatchMessageA
SendMessageA
CallNextHookEx
PeekMessageA
SetWindowsHookExA
wsprintfW
wsprintfA
IsCharAlphaNumericA
CharLowerA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
ReleaseDC
GetSystemMetrics
GetDC
GetKeyState
gdi32
ScaleWindowExtEx
SetWindowExtEx
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
BitBlt
SelectObject
DeleteObject
CreateCompatibleDC
DeleteDC
CreateCompatibleBitmap
CreateDCA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateBitmap
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
OpenServiceA
StartServiceA
QueryServiceStatus
ws2_32
gethostname
WSACleanup
gethostbyname
WSAStartup
inet_ntoa
inet_addr
comctl32
ord17
iphlpapi
GetAdaptersInfo
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
oleaut32
GetErrorInfo
Exports
Exports
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ