WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
2fb64897071561ddc88c94698a7b8d43_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2fb64897071561ddc88c94698a7b8d43_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2fb64897071561ddc88c94698a7b8d43_JaffaCakes118
-
Size
54KB
-
MD5
2fb64897071561ddc88c94698a7b8d43
-
SHA1
02cb7f7b876e8cb6e87379dea83d3261274418c6
-
SHA256
38e771ac0657abdc5bb8b6a5d0808485f04dd7f41e079c279e94913ed18d7c3b
-
SHA512
5ddc5f55acd20f237cf50152d89e0043c946afcdbb0e7986d07d852cc7916b6120b7b1ccc48e6380b9dffe5d28a46ce1a10a007188f91fe0aa76c77f712d27dc
-
SSDEEP
768:cbrc6SmudsrEvhjxbN12iV34LWR80JvGANQYeC5pDE1AdSCW3KUI2pbYAKSl:uqds2hjYipO0OC5YeV7uISl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fb64897071561ddc88c94698a7b8d43_JaffaCakes118
Files
-
2fb64897071561ddc88c94698a7b8d43_JaffaCakes118.dll windows:4 windows x86 arch:x86
7959b4fa05a750902e24e09b56b127bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord1980
ord2770
ord356
ord5683
ord2614
ord924
ord2784
ord668
ord6876
ord5710
ord4129
ord860
ord1615
ord5773
ord5442
ord939
ord536
ord4204
ord665
ord354
ord958
ord5186
ord539
ord2764
ord4202
ord940
ord825
ord3811
ord3337
ord923
ord5603
ord1105
ord6140
ord2061
ord858
ord4277
ord922
ord538
ord5572
ord2915
ord5858
ord537
ord341
ord654
ord540
ord2818
ord535
ord800
ord610
ord287
ord3575
ord5812
ord6394
ord6383
ord5440
ord5450
ord6139
ord823
ord2107
ord3663
ord2841
msvcrt
_adjust_fdiv
malloc
_initterm
free
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
__CxxFrameHandler
memmove
_access
exit
_mbscmp
_purecall
_mbsicmp
kernel32
SetLastError
GetModuleHandleA
GetVolumeInformationA
SetFileAttributesA
MoveFileExA
GetModuleFileNameA
OutputDebugStringA
ExpandEnvironmentStringsA
GetCurrentThreadId
GlobalFree
GlobalAlloc
ReleaseMutex
CloseHandle
CreateMutexA
WriteProcessMemory
IsBadReadPtr
GetCurrentDirectoryA
GetCurrentProcessId
Sleep
GetLastError
CreateFileA
GetProcAddress
DeleteFileA
FreeLibrary
MoveFileA
GetTickCount
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetTempPathA
GetSystemDirectoryA
SetFileTime
GetFileAttributesA
GetFileAttributesExA
OpenMutexA
WriteFile
LoadLibraryA
LeaveCriticalSection
GetTempFileNameA
ws2_32
send
recv
WSADuplicateSocketA
select
WSASocketA
WSAStartup
WSCEnumProtocols
WSCGetProviderPath
bind
inet_addr
htonl
gethostname
socket
connect
gethostbyname
ntohs
getpeername
getsockname
accept
closesocket
htons
__WSAFDIsSet
imagehlp
MapFileAndCheckSumA
Exports
Exports
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ