WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
31578a41f1c45255218d4ad672c3f5da_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
31578a41f1c45255218d4ad672c3f5da_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
31578a41f1c45255218d4ad672c3f5da_JaffaCakes118
-
Size
54KB
-
MD5
31578a41f1c45255218d4ad672c3f5da
-
SHA1
70e360fc7b1daa8a7fa53e80a6b5b0061c6297e3
-
SHA256
3857c6fbc1add18a6322e0eb17acfca9f7294de78a668bf95c6d7c30b0fda6dc
-
SHA512
294c3542770a830eaf014293ca2740c0191eda493fbe8d3324eb0b7acaaf373745f3cd18eaee0209d82b037e531925d312d116f5464f3d734118067fe5d2fda9
-
SSDEEP
1536:FrB6PuBVuQnlXuFH4ozMPl6EIUoGlz5hprRRX:FrB1BkQnlXuFH/MPl64fZ5rrR1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31578a41f1c45255218d4ad672c3f5da_JaffaCakes118
Files
-
31578a41f1c45255218d4ad672c3f5da_JaffaCakes118.dll windows:4 windows x86 arch:x86
3e1e78a084287efef5d2262be36d181e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetFileAttributesA
CreateFileA
GetDriveTypeA
GetLogicalDriveStringsA
GetTickCount
FindClose
FindFirstFileA
SetFilePointer
DeleteFileW
FindNextFileW
FileTimeToSystemTime
CreateFileW
FindFirstFileW
GetTempPathW
DeleteFileA
FindNextFileA
GetTempPathA
GetVersionExA
LoadLibraryA
GetFileTime
lstrlenA
TerminateThread
ReleaseMutex
GetModuleFileNameA
DeviceIoControl
OpenMutexA
MoveFileExA
MoveFileA
CopyFileA
GetSystemDirectoryA
GetLastError
FreeLibrary
SetFileTime
GetComputerNameA
CreateMutexA
SetCurrentDirectoryA
FlushFileBuffers
SetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
ExpandEnvironmentStringsA
WriteFile
lstrcpyA
CreatePipe
CreateProcessA
CreateThread
WaitForSingleObject
ReadFile
PeekNamedPipe
GetCurrentProcess
TerminateProcess
Sleep
OpenProcess
CloseHandle
GetProcAddress
user32
DestroyWindow
IsWindow
SendMessageA
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupAccountSidA
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
RegOpenKeyExA
shell32
ShellExecuteA
StrStrIA
ws2_32
socket
inet_ntoa
inet_addr
closesocket
gethostbyname
htons
sendto
recvfrom
setsockopt
recv
WSAIoctl
bind
gethostname
ntohs
send
connect
WSAStartup
msvfw32
MCIWndCreateA
avicap32
capCreateCaptureWindowA
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
msvcrt
_strlwr
_itoa
_strnicmp
_adjust_fdiv
malloc
_initterm
free
memchr
strrchr
strncmp
fopen
fseek
fread
fclose
rename
swprintf
wcslen
strstr
time
srand
rand
??2@YAPAXI@Z
atoi
_except_handler3
sprintf
??3@YAXPAX@Z
__CxxFrameHandler
shlwapi
SHGetValueA
SHSetValueA
Exports
Exports
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inidata Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ