eybxf
Static task
static1
Behavioral task
behavioral1
Sample
2f57468eacd2931ecc3acb80e0a58e3f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f57468eacd2931ecc3acb80e0a58e3f_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2f57468eacd2931ecc3acb80e0a58e3f_JaffaCakes118
-
Size
328KB
-
MD5
2f57468eacd2931ecc3acb80e0a58e3f
-
SHA1
3ab1a74b1aba9b6f10108d5b819b6e2a4b68c0a1
-
SHA256
4817e68f77019ab70047122227363f7b562f821ccd58f63fa79be001b854d7c6
-
SHA512
1bb86e0161985b9652dcfb4b83af309f40c801fc758940d1a3dcf9bddf1540c846b496b6735e3ff3a563f6f5949bbebdc1353299178db36b7241804ed455cff7
-
SSDEEP
6144:hJLJukkfljATsd1PSmubv2G2qI/HakIBIzcafUhkjBTBH/lXwub2xK5u1juh:DLxkFibvkqy5jzLfU2BTBflXwjK54juh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f57468eacd2931ecc3acb80e0a58e3f_JaffaCakes118
Files
-
2f57468eacd2931ecc3acb80e0a58e3f_JaffaCakes118.dll windows:4 windows x86 arch:x86
fd0279b9cdcb1bb98f1a768ac2a99457
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shlwapi
SHRegDuplicateHKey
kernel32
ConvertDefaultLocale
Beep
HeapAlloc
GetProcessHeap
HeapFree
user32
SetWinEventHook
GetMessageW
PostMessageW
IsDialogMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
UnhookWinEvent
GetParent
EndDialog
GetDlgItemTextW
wsprintfW
SetDlgItemTextW
SetFocus
GetDlgItem
GetWindowLongW
SetWindowLongW
winmm
mmioInstallIOProcA
Exports
Exports
Sections
.code Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 869B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 276KB - Virtual size: 305KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ