Static task
static1
Behavioral task
behavioral1
Sample
2b2bbae3cb302a364bb4b482ba8a6ff6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b2bbae3cb302a364bb4b482ba8a6ff6_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2b2bbae3cb302a364bb4b482ba8a6ff6_JaffaCakes118
-
Size
168KB
-
MD5
2b2bbae3cb302a364bb4b482ba8a6ff6
-
SHA1
227c27d7ff6503446de174475f0559f6cf515eb2
-
SHA256
203a6de500d44f958a0d35fae72c9d35971f64abd0750b4f0d55b607495320ce
-
SHA512
5d91548bcb1699a7f4dcac051ac6217ce87ae59d1c89a3eeb7cb504baa87185ebde780d030ab9b0de8595ade5759ba2c0c0b2c5f8c951e86c25ecb369a6a3c7d
-
SSDEEP
3072:lE0M9Mc1u+8oGKeHqLIufvp2HZwtmI92/YcrveU39fxvj74Fg1vhXUdbbEj0mNLJ:y9MlN5K8IL56Zwd2gEvd9h7jvhXU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b2bbae3cb302a364bb4b482ba8a6ff6_JaffaCakes118
Files
-
2b2bbae3cb302a364bb4b482ba8a6ff6_JaffaCakes118.dll windows:4 windows x86 arch:x86
fa86595294e370d45283d3b19895babc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemTime
FreeLibrary
GetProcAddress
CompareFileTime
GetDriveTypeW
CreateMutexW
DeleteCriticalSection
GetModuleFileNameW
GetVolumePathNameW
CreateDirectoryW
SetLastError
RaiseException
EnterCriticalSection
OpenFileMappingW
DuplicateHandle
CompareStringW
LoadLibraryA
LeaveCriticalSection
ExpandEnvironmentStringsW
CreateProcessW
LoadLibraryExW
lstrlenW
LoadResource
SizeofResource
lstrlenA
lstrcpynW
lstrcatW
InitializeCriticalSection
InterlockedDecrement
lstrcpyW
SetFilePointer
TlsSetValue
GetTickCount
IsBadWritePtr
WideCharToMultiByte
MultiByteToWideChar
GetACP
lstrcmpiA
LoadLibraryW
lstrcmpA
lstrcmpW
DeleteFileA
DeleteFileW
ReadFile
TlsGetValue
lstrcpynA
GetProfileIntW
CloseHandle
GetFileAttributesW
LocalAlloc
LocalFree
InterlockedIncrement
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileW
HeapFree
GetProcessHeap
HeapAlloc
GetWindowsDirectoryW
GetCommandLineA
GlobalFree
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
InterlockedExchange
GetCommandLineW
Sleep
GlobalUnlock
lstrcmpiW
VirtualProtect
FindResourceW
GlobalAlloc
user32
GetMenu
GetCursorPos
InvalidateRect
CheckMenuRadioItem
IsWindowVisible
MoveWindow
BeginDeferWindowPos
EndDeferWindowPos
CheckRadioButton
SetFocus
UpdateWindow
GetWindowRect
GetDC
ReleaseDC
ShowWindow
GetParent
EnumChildWindows
EnableWindow
GetDlgItem
CharLowerW
PostMessageW
PostMessageA
SetWindowTextW
SetWindowTextA
SystemParametersInfoW
SystemParametersInfoA
SendDlgItemMessageW
SendDlgItemMessageA
SendMessageW
SendMessageA
LoadStringA
GetSysColor
CheckMenuItem
GetActiveWindow
MessageBoxW
GetSystemMetrics
LoadStringW
BeginPaint
EndPaint
SetScrollInfo
DefWindowProcW
FillRect
SetRect
SetWindowPos
GetClientRect
GetWindowLongW
TranslateMessage
IsWindow
GetPropW
DestroyWindow
RemovePropW
PostQuitMessage
SetPropW
SetTimer
CharNextW
CharPrevW
SetWindowLongW
DispatchMessageW
advapi32
RegQueryValueExW
RegEnumValueA
RegQueryValueExA
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegisterEventSourceA
DeregisterEventSource
ReportEventW
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
SetTokenInformation
InitializeSid
GetSidLengthRequired
CreateRestrictedToken
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
gdi32
GetFontResourceInfoW
AddFontResourceW
RemoveFontResourceW
CreateCompatibleDC
DeleteObject
SelectObject
DeleteDC
ole32
StringFromCLSID
CoGetMalloc
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
ReleaseStgMedium
PropVariantClear
CoTaskMemFree
msvcr71
_onexit
memmove
_vsnwprintf
memset
_amsg_exit
free
_XcptFilter
_wcsnicmp
wcschr
_adjust_fdiv
_initterm
strncat
memcpy
_wcslwr
realloc
malloc
wcslen
wcsncpy
__CppXcptFilter
__dllonexit
_except_handler3
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ