Static task
static1
Behavioral task
behavioral1
Sample
36cf81c9322a63aac236a3eed0e43e78_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36cf81c9322a63aac236a3eed0e43e78_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
36cf81c9322a63aac236a3eed0e43e78_JaffaCakes118
-
Size
46KB
-
MD5
36cf81c9322a63aac236a3eed0e43e78
-
SHA1
95c3e85e15688aa3b4ebe230cafef85624bcada4
-
SHA256
cb7c384eec11cd571f91bea1f7802c5eff46baba723bab8f7ef5b175ad899e3e
-
SHA512
dfc4784ada4c8ea5172a06237887e0f7a6ee09ff2b0639262f927a9734aec77530c81dbc366571373e3b156553b3b7533768220c021dabfbae2c93a77fbc0979
-
SSDEEP
768:qp7Si0t547KhgppWXwysTmmXE3jKwVmxe8YJvwe2k1//qQMRUn7n:mSi0nmKhgp7bpyVmE8s/wRU7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36cf81c9322a63aac236a3eed0e43e78_JaffaCakes118
Files
-
36cf81c9322a63aac236a3eed0e43e78_JaffaCakes118.dll windows:5 windows x86 arch:x86
540241cbaffc48eeeb59e2f07c2de7de
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
lstrcpyW
GetCommandLineW
lstrlenW
lstrcatW
GetSystemDirectoryW
GetModuleFileNameW
FreeLibraryAndExitThread
GetProcAddress
GetModuleHandleW
VirtualFree
GetExitCodeThread
CreateProcessW
ResumeThread
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
LoadLibraryW
CloseHandle
WaitForSingleObject
ExitProcess
HeapSize
LCMapStringW
GetCurrentThreadId
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapFree
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
WriteFile
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
user32
GetWindowThreadProcessId
wsprintfW
FindWindowW
advapi32
GetTokenInformation
OpenProcessToken
shell32
CommandLineToArgvW
Exports
Exports
Shell_Init
Shell_Start
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ