Static task
static1
Behavioral task
behavioral1
Sample
2b5007b30f00c8597408c94a84779061_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b5007b30f00c8597408c94a84779061_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2b5007b30f00c8597408c94a84779061_JaffaCakes118
-
Size
25KB
-
MD5
2b5007b30f00c8597408c94a84779061
-
SHA1
87eb624f0ef99f6d888c417bcea6510577822394
-
SHA256
78c47cdecdacdeff0132176fd03c275ed4a89b702efcd971d16f288bb9eec08c
-
SHA512
51bc66b8989d324482bb9207c8d2b0b4829b411d0e0899489e8dc2905c1fad0daf609ac2256ecb7761fd585d1c0a2afd3dc1001601dcc44f8d936be4b5427d6c
-
SSDEEP
768:Z4N6CoYxWDHgT8YDdhDbRx5q2Br2WOeGs:Z4N6CoYxWk1x5q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b5007b30f00c8597408c94a84779061_JaffaCakes118
Files
-
2b5007b30f00c8597408c94a84779061_JaffaCakes118.dll windows:4 windows x86 arch:x86
49141cd77cb750c968e5793a00f9eaf1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
GetLastError
CreateMutexA
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
IsBadReadPtr
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
WriteProcessMemory
GlobalUnlock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
Sleep
GlobalAlloc
GlobalLock
ReadProcessMemory
CreateThread
GetCurrentProcess
GetCurrentThreadId
TerminateThread
VirtualProtectEx
GetCurrentThread
user32
GetForegroundWindow
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
GetWindowTextA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
msvcrt
fread
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strrchr
wcslen
strcat
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
memcpy
strncpy
strchr
strstr
fclose
_strnicmp
fopen
memset
strcmp
sscanf
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ