Static task
static1
Behavioral task
behavioral1
Sample
3030e4d8871b4d8ce24f533e0b1bd418_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3030e4d8871b4d8ce24f533e0b1bd418_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
3030e4d8871b4d8ce24f533e0b1bd418_JaffaCakes118
-
Size
29KB
-
MD5
3030e4d8871b4d8ce24f533e0b1bd418
-
SHA1
d858e81f53acd08349665544883763f134c3389b
-
SHA256
fd3f40c5778c83c0066f130349eac533d11f2fa2cdbc0b9f02723ffaeaa9e9f5
-
SHA512
91e8ec2691a2ad3f1b4a3a55af1b95c361cc79247687503893847e51190d7923642ccf542fa6504c751e5d1f9d6694c450709b5754cb8e555771baabe9af14b8
-
SSDEEP
384:7+ock1DfvJ7LoIVbLpPDAjO5kyIIoR7/mv7g/F39Cp4Z5/GC2ZUq9:aoceb9NRYtR4sF39Cpw5/F2Z7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3030e4d8871b4d8ce24f533e0b1bd418_JaffaCakes118
Files
-
3030e4d8871b4d8ce24f533e0b1bd418_JaffaCakes118.dll windows:4 windows x86 arch:x86
f56359de763565e206f42039910a70d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ExitProcess
FindClose
FindFirstFileA
FreeLibrary
GetCommandLineA
GetFileSize
GetLastError
GetModuleFileNameA
GetProcAddress
LoadLibraryA
ReadFile
SetEndOfFile
SetFilePointer
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
user32
BeginPaint
CheckMenuRadioItem
CheckRadioButton
CreateMenu
CreateWindowExA
DestroyCursor
DestroyWindow
GetCapture
GetCursorPos
GetDC
GetSystemMetrics
GetWindow
GetWindowDC
GetWindowDC
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
SendMessageA
SetCursor
SetForegroundWindow
SetMenu
SetMenuItemInfoA
SetPropA
SetScrollPos
SetScrollRange
SetSysColors
SetTimer
SetWindowLongA
SetWindowPos
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
ValidateRect
WaitMessage
wvsprintfA
gdi32
SetBrushOrgEx
SetPixel
shell32
DragAcceptFiles
DragFinish
DragQueryFile
SHBrowseForFolder
ShellExecuteA
SHGetPathFromIDList
comdlg32
ChooseColorA
GetSaveFileNameA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.text Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
CODE Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.code Size: 7KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ