Static task
static1
Behavioral task
behavioral1
Sample
3183bd1a9e844a7a9c6e3f2de8fd45aa_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3183bd1a9e844a7a9c6e3f2de8fd45aa_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3183bd1a9e844a7a9c6e3f2de8fd45aa_JaffaCakes118
-
Size
84KB
-
MD5
3183bd1a9e844a7a9c6e3f2de8fd45aa
-
SHA1
d888d7b3538f8e8bdd9b8c54bb2d7569078d4c26
-
SHA256
04c17af0298e2c9a1ee842f77961a3780d4c7cad4286a7c6d82782d574bb89ce
-
SHA512
09076f26589cc675376b53699de67f5a052be2125a2ad44109fac1f9917b61abb4c966e1954b4f3960b35e059910320458c9975370b264643fb8b22683c797f2
-
SSDEEP
1536:UV88umswjsrrjgnx0+1ajlfT7hbE/QiKv5dGdOBKTuyjSdjf/kpt:UV83Psnxn1Ql3hbkQ35dGeKTuyjSdjXu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3183bd1a9e844a7a9c6e3f2de8fd45aa_JaffaCakes118
Files
-
3183bd1a9e844a7a9c6e3f2de8fd45aa_JaffaCakes118.dll windows:4 windows x86 arch:x86
e8d002a1dadc970f5a2650eed8c1ae80
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord6648
ord4129
ord5710
ord926
ord924
ord922
ord537
ord2846
ord2764
ord2915
ord540
ord535
ord858
ord6663
ord860
ord4278
ord6877
ord800
ord2818
ord939
msvcrt
_adjust_fdiv
malloc
_initterm
free
strstr
strncmp
atoi
rand
srand
strchr
strtok
exit
_mbscmp
_local_unwind2
_except_handler3
_iob
fprintf
printf
__CxxFrameHandler
time
kernel32
GetTempPathA
CreateProcessA
GetSystemDirectoryA
TerminateThread
GetCurrentProcess
CreateMutexA
CloseHandle
GetComputerNameA
GlobalMemoryStatus
GetVersionExA
Sleep
GetProcAddress
LoadLibraryA
ExitProcess
ExitThread
GetLastError
GetCurrentProcessId
GetTickCount
HeapAlloc
CreateThread
GetProcessHeap
user32
ExitWindowsEx
wsprintfA
advapi32
RegOpenKeyA
CloseServiceHandle
StartServiceA
RegCloseKey
RegSetValueExA
RegDeleteValueA
ControlService
OpenServiceA
OpenSCManagerA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
GetUserNameA
urlmon
URLDownloadToFileA
ws2_32
inet_ntoa
ntohl
gethostbyname
closesocket
connect
htons
inet_addr
socket
send
WSAGetLastError
recv
__WSAFDIsSet
setsockopt
WSAStartup
sendto
WSASocketA
gethostname
WSACleanup
htonl
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data0 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ