Static task
static1
Behavioral task
behavioral1
Sample
308c613b59e76dd7b3751fa8d85c2b19_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
308c613b59e76dd7b3751fa8d85c2b19_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
308c613b59e76dd7b3751fa8d85c2b19_JaffaCakes118
-
Size
1.1MB
-
MD5
308c613b59e76dd7b3751fa8d85c2b19
-
SHA1
fd4ba82f7fb47bd74d94bff5cd7a6d3f6ea743cb
-
SHA256
b36a511d8972851037d3c8468e37868fe15ff86def42e39b6c597a76ba7071ed
-
SHA512
b54a1b4e0a3d7d4e4062646c6dc8c780f0da7030ac2e5fb17c4b42682926fbc6edc9750d1e5bc535ed949ce1a7f42d40cc1e3709a44b085ac5756687752da856
-
SSDEEP
24576:XdSFDu0oaCO7WgFvl/m68iynYW2uPJmomQ+2JZOC0XDo:XET7RlMF9PJmo7sB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 308c613b59e76dd7b3751fa8d85c2b19_JaffaCakes118
Files
-
308c613b59e76dd7b3751fa8d85c2b19_JaffaCakes118.dll windows:6 windows x64 arch:x64
baa93d47220682c04d92f7797d9224ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 120KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jsajspoc Size: 871KB - Virtual size: 872KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
esgtderg Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ