ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
2af65389c0bebc6137ac2f672cc8bad9_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2af65389c0bebc6137ac2f672cc8bad9_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2af65389c0bebc6137ac2f672cc8bad9_JaffaCakes118
-
Size
64KB
-
MD5
2af65389c0bebc6137ac2f672cc8bad9
-
SHA1
e64541a5caae596792823f1fd30120171808d98c
-
SHA256
ba5ef86f8317e785d4c817d89e92932b3b181cad2f558a558461083ce5a03c0a
-
SHA512
c91eb93b50c8d881dd000a64c0ef92fbcae18ddd0fb8b7aebf26f248490dee21448930f6bb6bb975f02bf3c2a76f7a37eb5cad3bb59f143bd8a63098fd7cb6e6
-
SSDEEP
1536:+7egXqv/9o5MpK7yZAM4w0rGaSX8sZoBvwJkL:+7ewa1o5MpK7yZAMvI+X8sZoBvPL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2af65389c0bebc6137ac2f672cc8bad9_JaffaCakes118
Files
-
2af65389c0bebc6137ac2f672cc8bad9_JaffaCakes118.dll windows:4 windows x86 arch:x86
ec6ebdff7dc799d9114f52d7f94558dd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
select
__WSAFDIsSet
socket
connect
send
recv
closesocket
htons
WSACleanup
WSAStartup
inet_ntoa
inet_addr
gethostbyname
mfc42
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord641
ord4078
ord1168
ord2379
ord755
ord470
ord1176
ord800
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord6467
ord1578
ord6052
ord1116
ord2514
ord4710
ord4998
ord4853
ord4376
ord5265
ord2725
ord3953
ord537
ord825
ord269
ord826
ord600
ord815
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord823
ord551
ord2764
ord922
ord924
ord4277
ord4129
ord858
ord6663
ord2915
ord860
ord939
ord941
ord2614
ord2818
ord535
ord4234
ord540
msvcrt
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
_iob
fprintf
wcslen
putc
getc
time
srand
rand
strchr
strstr
fflush
fopen
_stricmp
_strupr
strcmp
_mbscmp
atol
strtok
atoi
memcpy
strlen
free
malloc
__CxxFrameHandler
memset
strcpy
_itoa
_strlwr
strcat
fclose
kernel32
FileTimeToSystemTime
GetLastError
Sleep
GetFileSize
ReadFile
SetFilePointer
WriteFile
SetEndOfFile
SystemTimeToFileTime
GetTempPathA
GetTempFileNameA
LoadLibraryA
GetProcAddress
SetFileTime
SetFileAttributesA
CreateFileA
CloseHandle
ExitThread
GetFileAttributesExA
GetSystemDirectoryA
DeleteFileA
lstrcatA
lstrlenA
GetModuleFileNameA
MoveFileExA
ExpandEnvironmentStringsA
lstrcpyA
GetCurrentProcess
GetTickCount
GetVolumeInformationA
GetLocaleInfoA
GetComputerNameA
GetSystemTime
CreateThread
CreateMutexA
WideCharToMultiByte
MultiByteToWideChar
LocalFree
GetCurrentThreadId
GetModuleHandleA
LocalAlloc
CreateProcessA
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
PeekNamedPipe
GetVersionExA
GetEnvironmentVariableA
CreatePipe
user32
SetUserObjectSecurity
EnableWindow
IsIconic
GetSystemMetrics
GetUserObjectSecurity
DrawIcon
SendMessageA
CloseDesktop
SetThreadDesktop
SetProcessWindowStation
CloseWindowStation
GetThreadDesktop
GetProcessWindowStation
GetClientRect
wsprintfA
ExitWindowsEx
advapi32
LookupPrivilegeValueA
ImpersonateLoggedOnUser
CreateProcessAsUserA
RevertToSelf
OpenProcessToken
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
LookupAccountNameA
IsValidSecurityDescriptor
SetSecurityDescriptorDacl
MakeAbsoluteSD
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetSecurityDescriptorDacl
SetTokenInformation
AllocateLocallyUniqueId
GetTokenInformation
DuplicateTokenEx
AdjustTokenPrivileges
shell32
ShellExecuteA
shlwapi
StrStrA
netapi32
NetUserEnum
NetUserGetLocalGroups
NetApiBufferFree
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ