Static task
static1
Behavioral task
behavioral1
Sample
2a1d00ec52703b419186cc30a03aa374_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2a1d00ec52703b419186cc30a03aa374_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2a1d00ec52703b419186cc30a03aa374_JaffaCakes118
-
Size
89KB
-
MD5
2a1d00ec52703b419186cc30a03aa374
-
SHA1
22e6719c91d9f2f3655b576970e8c80337699d91
-
SHA256
c24debdec88310dfe57da875676d3925488ddd52d8517e4c66d819186761cc52
-
SHA512
5cfa7f30d6e122f15136b6d7cbd97c32e274fdbe48fac79cc6fddb159076de1f2a91f680b778f0651bf7972b84af26f3d0ef167ae517d59fd319f5270502fab1
-
SSDEEP
1536:uakruj8qR30zT/bNoKVKHGAmkWl1wCWdgWU0lxYJiwk8iJRI3hfcfryq/Lo7yldk:u4Rkz2sOGAUlkBXYiw4IxUmq/Loml3Xi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a1d00ec52703b419186cc30a03aa374_JaffaCakes118
Files
-
2a1d00ec52703b419186cc30a03aa374_JaffaCakes118.dll windows:4 windows x86 arch:x86
0a2b217a3e531173bba332781a1fc3fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ShowWindow
SetWindowTextA
SetWindowPos
SetWindowLongA
wsprintfA
SendMessageA
SendDlgItemMessageA
ReleaseDC
OemToCharA
wsprintfW
CharLowerA
SetDlgItemTextA
InsertMenuItemW
LoadStringA
LoadImageA
InvalidateRect
BeginPaint
InsertMenuItemA
GetWindowTextA
GetWindowRect
GetWindowLongA
GetWindow
GetSystemMetrics
GetSysColor
GetParent
GetDlgItemTextA
GetDlgItem
GetDC
GetClientRect
GetClassNameA
EndPaint
CreatePopupMenu
CharUpperW
CharUpperA
CharToOemA
CharLowerW
ole32
ReleaseStgMedium
kernel32
lstrcpynW
lstrcpynA
WriteFile
WriteConsoleW
WriteConsoleA
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
CloseHandle
CompareStringA
CreateDirectoryA
CreateFileA
CreateFileW
DeleteCriticalSection
DeleteFileA
DeleteFileW
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileAttributesA
GetFileAttributesW
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetNumberFormatA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFileTimeToFileTime
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
ord8
shell32
SHGetPathFromIDListA
DragQueryFileW
DragQueryFileA
ShellExecuteExA
gdi32
SelectObject
Polyline
Polygon
SetPixel
GetTextFaceA
GetPixel
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontA
CreateCompatibleDC
SetTextColor
TextOutA
GetTextMetricsA
advapi32
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ