fxUsermon
Static task
static1
Behavioral task
behavioral1
Sample
3156889c44b798afc39865f672b3f795_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3156889c44b798afc39865f672b3f795_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3156889c44b798afc39865f672b3f795_JaffaCakes118
-
Size
152KB
-
MD5
3156889c44b798afc39865f672b3f795
-
SHA1
bae84ca72aed738c23be19df4752807c9305dab1
-
SHA256
aa49d43304ddf906a6b28c05ac75d91961890f2a6ad34bd677394c13976b23d0
-
SHA512
280f78ed7f0620a10ab368ff836b3652dd6c908ac713ad35a27a50a47dc3a6f089950a05b4410a5e1e16c3abd42746df96800aaf44bcbd070aec95eefa47e5ce
-
SSDEEP
3072:H4K5B1BqEK7kuHArEEFT2u6mqGz+gkXjkzO1XQ1Q6yj:jvbKIuHArE+T2fetCEO5Waj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3156889c44b798afc39865f672b3f795_JaffaCakes118
Files
-
3156889c44b798afc39865f672b3f795_JaffaCakes118.dll windows:4 windows x86 arch:x86
45586c9fe6ead473884bd9e4f12c2138
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
CreateEventA
GlobalAlloc
CreateMutexW
EnterCriticalSection
HeapAlloc
CreateFileMappingA
WriteProcessMemory
LocalFree
CopyFileA
GlobalFree
GetVolumeInformationA
LoadLibraryA
HeapFree
GetCommandLineA
UnmapViewOfFile
InterlockedDecrement
MapViewOfFile
CreateFileA
ReadProcessMemory
LeaveCriticalSection
WaitForSingleObject
GetTickCount
CreateDirectoryA
OpenEventA
CreateProcessA
GetLastError
InterlockedCompareExchange
GetCurrentProcess
OpenFileMappingA
ExitProcess
GetProcAddress
GetModuleHandleA
SetLastError
GetComputerNameA
WriteFile
GetProcessHeap
GetModuleFileNameA
InterlockedIncrement
TerminateProcess
CloseHandle
ole32
CoTaskMemAlloc
CoCreateInstance
OleCreate
CoInitialize
CoSetProxyBlanket
OleSetContainedObject
CoCreateGuid
CoUninitialize
user32
GetWindowThreadProcessId
RegisterWindowMessageA
SendMessageA
SetTimer
FindWindowA
GetMessageA
ClientToScreen
GetCursorPos
PeekMessageA
CreateWindowExA
DestroyWindow
GetWindowLongA
GetClassNameA
TranslateMessage
GetWindow
ScreenToClient
DefWindowProcA
PostQuitMessage
KillTimer
GetSystemMetrics
DispatchMessageA
UnhookWindowsHookEx
SetWindowLongA
SetWindowsHookExA
GetParent
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegCreateKeyExA
RegQueryValueExA
GetUserNameA
RegCloseKey
OpenProcessToken
RegOpenKeyExA
SetTokenInformation
RegDeleteKeyA
RegSetValueExA
DuplicateTokenEx
RegDeleteValueA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 964B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ezxptss Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ