Static task
static1
Behavioral task
behavioral1
Sample
30d755373daca895c33c2f59599da9d8_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30d755373daca895c33c2f59599da9d8_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
30d755373daca895c33c2f59599da9d8_JaffaCakes118
-
Size
128KB
-
MD5
30d755373daca895c33c2f59599da9d8
-
SHA1
b2e1551fe2bc117323571b0b6f6ef0de50649c1c
-
SHA256
722ca6c78b74aed89f387f4c7c9037375591d5a3f60000dc089ba0bf84f4b52e
-
SHA512
75ccf053fe9e3c870bc344f9854f78922bdf5a29ec7a39bf0360ab0fc83d2b6d42c7b1544fe614cbc5df99ac94d5863ebd09be99d23177bbd729bde9817ef326
-
SSDEEP
3072:UEa1Mbbx9jwowcabIyWq4X5ppEHEbhjClf0IY+m1/mWJnonodxFKI:yCbb/jwowcabKV5paHEbhjClf0IY+u+s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30d755373daca895c33c2f59599da9d8_JaffaCakes118
Files
-
30d755373daca895c33c2f59599da9d8_JaffaCakes118.dll windows:4 windows x86 arch:x86
6b8a11a5d8b99ca1f99767a3d4771493
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
GetModuleFileNameA
CreateEventA
GetLastError
SetEvent
FlushFileBuffers
WriteFile
SetFilePointer
CreateFileA
WaitForMultipleObjects
GetFileAttributesA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
ReleaseMutex
ReadFile
GetFileSize
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
MultiByteToWideChar
lstrlenA
InitializeCriticalSection
DeleteCriticalSection
ResumeThread
CreateThread
OpenMutexA
CreateIoCompletionPort
TerminateThread
PostQueuedCompletionStatus
ExitThread
LeaveCriticalSection
EnterCriticalSection
OpenEventA
DisconnectNamedPipe
GetQueuedCompletionStatus
ConnectNamedPipe
TerminateProcess
DeleteFileA
WinExec
FreeLibrary
lstrcmpA
MoveFileExA
MoveFileA
lstrcatA
GetTempFileNameA
GetShortPathNameA
GetVersion
SetFileAttributesA
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateMutexA
LoadLibraryA
CreateNamedPipeA
GetProcAddress
LCMapStringW
LCMapStringA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
WideCharToMultiByte
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
user32
PostThreadMessageA
ole32
StgOpenStorage
StgCreateDocfile
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
wininet
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetSetOptionA
InternetAttemptConnect
InternetCloseHandle
HttpAddRequestHeadersA
HttpQueryInfoA
InternetReadFile
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
rpcrt4
UuidCreate
UuidToStringA
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ