_Set@16
Static task
static1
Behavioral task
behavioral1
Sample
3048e2a1a83fb84c31588fe5b9952e13_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3048e2a1a83fb84c31588fe5b9952e13_JaffaCakes118.dll
Resource
win10v2004-20240708-en
General
-
Target
3048e2a1a83fb84c31588fe5b9952e13_JaffaCakes118
-
Size
96KB
-
MD5
3048e2a1a83fb84c31588fe5b9952e13
-
SHA1
3a3bb1b24aa9159096d3acba60cce56000db3791
-
SHA256
47b0934b2d889d374e2e582554fe98b5f92a5ea99392ef16c0c35c4634b8f2a4
-
SHA512
41e53e95e0acdc14296078a8a90b4274f7ef243e714bc92f3682cd2c8fc32d273629ebfe3cabb9a9203767fa8dbd87bc4301d1d3d3d8911888e2896d98f5822d
-
SSDEEP
768:MKyaHNr7VrNsPqXyTOoKBrsWwZeZsOSIJ2sUk/fY/k7scc8lI8ZI4G0U5tPN:lCrqoBe+IJ2sUkYBcc8lI8ZIn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3048e2a1a83fb84c31588fe5b9952e13_JaffaCakes118
Files
-
3048e2a1a83fb84c31588fe5b9952e13_JaffaCakes118.dll windows:4 windows x86 arch:x86
ea163e02482d53e69f3aab17a960b7a0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
IsBadStringPtrA
UnmapViewOfFile
lstrlenA
MapViewOfFile
CreateFileMappingA
CloseHandle
OpenFileMappingA
WideCharToMultiByte
lstrlenW
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualProtect
CreateThread
GetTickCount
VirtualAlloc
VirtualFree
VirtualQuery
HeapCreate
GetSystemInfo
lstrcpyA
InterlockedIncrement
ExitProcess
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentThreadId
GetWindowsDirectoryA
GetLastError
lstrcatA
GetCommandLineA
OutputDebugStringA
OpenProcess
ReleaseMutex
CreateMutexA
Process32Next
TerminateProcess
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
GetCurrentProcess
Module32Next
Module32First
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
GetModuleHandleA
Sleep
GetCurrentProcessId
user32
wsprintfA
CallNextHookEx
PostThreadMessageA
UnhookWindowsHookEx
GetMessageA
SetWindowsHookExA
GetWindowThreadProcessId
EnumWindows
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shlwapi
PathFileExistsA
StrStrIA
StrStrW
StrStrA
msvcrt
_stricmp
_memicmp
_adjust_fdiv
_initterm
isprint
strrchr
atol
fopen
fseek
ftell
rewind
strstr
__CxxFrameHandler
isdigit
sscanf
sprintf
atoi
_itoa
isspace
isalnum
free
malloc
fgetc
Exports
Exports
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ