Static task
static1
Behavioral task
behavioral1
Sample
2aead005c6be8e4a50f1bffcb8b585ae_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2aead005c6be8e4a50f1bffcb8b585ae_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2aead005c6be8e4a50f1bffcb8b585ae_JaffaCakes118
-
Size
160KB
-
MD5
2aead005c6be8e4a50f1bffcb8b585ae
-
SHA1
5417890e2dbd18e51a7aada6787705eb19be2abd
-
SHA256
7f85ca804b3ae498b3fbef7232e2cc1e567fee94032e7729d88dec5888657455
-
SHA512
927d35e1b7ef9633892b798044bb04d90e0be39708b0479627396c836042eff2d87f44eb8882afd7a1626829d86efef38f37fa6c07844bdf48aed62ff3643a5a
-
SSDEEP
3072:zotVrq3m6fauz7e72H2Zo9B3K72UoMqswYXif08MqqDLy/+d0ded93OTI:zsrqWAlea2Zonn33sHi8PqqDLunT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2aead005c6be8e4a50f1bffcb8b585ae_JaffaCakes118
Files
-
2aead005c6be8e4a50f1bffcb8b585ae_JaffaCakes118.dll windows:4 windows x86 arch:x86
1170e0fa80617e2bbf8ab629609c4114
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadWritePtr
IsBadCodePtr
FindClose
FindNextFileA
FindFirstFileA
ReadFile
SetConsoleTextAttribute
GetStdHandle
SetFileApisToOEM
IsDBCSLeadByte
FormatMessageA
IsBadReadPtr
ExitProcess
UnmapViewOfFile
CloseHandle
MapViewOfFile
CreateFileMappingA
GetFileSize
SetCurrentDirectoryA
GetCurrentDirectoryA
GetConsoleOutputCP
GetConsoleScreenBufferInfo
DisableThreadLibraryCalls
InterlockedExchange
Sleep
InterlockedCompareExchange
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProfileStringA
GlobalReAlloc
VirtualProtect
lstrcatA
lstrcpyA
lstrlenA
MultiByteToWideChar
GetACP
WideCharToMultiByte
GlobalFree
GlobalHandle
FreeLibrary
GetModuleFileNameA
GetProcAddress
GetCurrentThreadId
GlobalLock
GlobalAlloc
GetPrivateProfileStringA
LocalAlloc
GetModuleHandleA
LocalFree
MulDiv
LoadLibraryA
GlobalUnlock
GetCommandLineA
CreateFileA
user32
LoadStringA
wsprintfA
CharLowerBuffA
GetDC
GetSystemMetrics
GetActiveWindow
WindowFromDC
CharToOemA
SetActiveWindow
SetCursor
SetWindowPos
CreateWindowExA
OffsetRect
AdjustWindowRect
ReleaseDC
DestroyWindow
CharLowerA
IsIconic
GetSysColor
GetSysColorBrush
DefMDIChildProcA
GetKeyState
SetRect
DestroyMenu
CheckMenuItem
CreatePopupMenu
AppendMenuA
wvsprintfA
PostMessageA
MessageBoxA
KillTimer
SetTimer
FillRect
SetRectEmpty
DrawTextA
SetPropA
SystemParametersInfoA
DefWindowProcA
CharUpperBuffA
MoveWindow
CheckDlgButton
EndDialog
ShowWindow
SetScrollRange
IsDlgButtonChecked
EnableWindow
SetDlgItemInt
SetScrollPos
InvalidateRect
SendMessageA
GetClientRect
GetScrollPos
SetDlgItemTextA
GetDlgItem
GetWindowRect
ScreenToClient
GetWindowLongA
IsRectEmpty
IsZoomed
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumKeyA
gdi32
GetDeviceCaps
CreateCompatibleBitmap
SelectPalette
GetObjectA
CreateDIBSection
DeleteObject
GetStockObject
CreatePalette
GetPaletteEntries
SetPaletteEntries
RealizePalette
GdiFlush
DeleteDC
SelectObject
CreateCompatibleDC
SetTextColor
StretchBlt
CreateFontIndirectA
GetNearestColor
Escape
GetBitmapBits
PatBlt
SetBkColor
ExtTextOutA
GetSystemPaletteEntries
ResizePalette
SetBitmapBits
StretchDIBits
rpcrt4
NdrDllRegisterProxy
msvcrt
labs
free
_initterm
_adjust_fdiv
__CxxFrameHandler
_except_handler3
memset
memcpy
_CxxThrowException
malloc
fprintf
isalnum
isspace
isprint
_iob
_ultoa
strchr
fclose
fgets
fopen
_itoa
_isatty
tolower
isxdigit
_setmode
_fileno
_wsetlocale
clock
_cexit
isalpha
_strupr
_strncoll
memmove
exit
strcspn
strcoll
isupper
_strlwr
islower
_strnicoll
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ