Static task
static1
Behavioral task
behavioral1
Sample
32f0e9dc735b145adc36944f762a9b79_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32f0e9dc735b145adc36944f762a9b79_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
32f0e9dc735b145adc36944f762a9b79_JaffaCakes118
-
Size
667KB
-
MD5
32f0e9dc735b145adc36944f762a9b79
-
SHA1
2a3446c75eb96a277a9d72ba54a4f5d425453562
-
SHA256
26b4ad5c41bf5c16795cad240b7bb318b76ee6945c0f4592284e25f352fbf0b4
-
SHA512
4a83e5c1e87b8464c9a11cee3a160f7a34b0aa2ec58058083244148498d0531222e6377a060a9cce6930cc81479c21d4a27bedeed2d1402286a37df6627c2647
-
SSDEEP
12288:KDnFKXytZv7GPaoJLTDjyDsz6pZVv4qURPQHtZrjQJ7vBFoG:KD8XytZzGyopTDjyDrpTbNKByG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32f0e9dc735b145adc36944f762a9b79_JaffaCakes118
Files
-
32f0e9dc735b145adc36944f762a9b79_JaffaCakes118.dll windows:4 windows x86 arch:x86
0bb9feb97f6e8c835438096c051c2918
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
htons
WSASocketW
setsockopt
WSAStartup
WSARecv
WSAWaitForMultipleEvents
WSASend
WSAResetEvent
WSAGetOverlappedResult
WSAGetLastError
WSACleanup
WSACreateEvent
shutdown
closesocket
WSACloseEvent
WSAAccept
listen
bind
psapi
GetModuleFileNameExW
wtsapi32
WTSFreeMemory
WTSEnumerateProcessesW
kernel32
OpenProcess
GetModuleHandleW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateDirectoryW
MoveFileW
CreateProcessW
GlobalMemoryStatusEx
GetSystemInfo
GetDiskFreeSpaceExW
GetVolumeInformationW
GetLocalTime
GetWindowsDirectoryW
GetComputerNameExW
GetVersionExW
GetLocaleInfoW
GetSystemDefaultUILanguage
GetCurrentProcessId
GetSystemDirectoryW
GetTempPathW
GetTempFileNameW
TerminateThread
GetExitCodeThread
WaitForSingleObject
GetCurrentProcess
DuplicateHandle
CreatePipe
PeekNamedPipe
GetProcAddress
ResumeThread
Sleep
FreeLibrary
FlushFileBuffers
GetFileTime
SetFileTime
LoadLibraryW
GetModuleFileNameW
GetACP
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
DeleteFileW
SetFileAttributesW
SetEndOfFile
WriteFile
GetSystemTimeAsFileTime
CreateFileW
CloseHandle
SetFilePointer
ReadFile
FindNextFileW
FindFirstFileW
FindClose
GetDriveTypeW
GetLogicalDrives
GetTickCount
EnterCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateThread
GetExitCodeProcess
TerminateProcess
DisableThreadLibraryCalls
GetOEMCP
GetCPInfo
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InterlockedExchange
VirtualQuery
LoadLibraryA
SetStdHandle
HeapSize
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualProtect
QueryPerformanceCounter
SetThreadPriority
FreeEnvironmentStringsA
GetModuleFileNameA
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
ExitProcess
GetModuleHandleA
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
user32
GetProcessWindowStation
SetProcessWindowStation
CloseWindowStation
OpenWindowStationW
SetThreadDesktop
OpenDesktopW
ReleaseDC
GetDC
GetSystemMetrics
ExitWindowsEx
GetClipboardData
CloseClipboard
OpenClipboard
gdi32
GetObjectW
RealizePalette
GetDIBits
SelectObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteObject
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
CreateServiceW
ChangeServiceConfig2W
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
StartServiceW
DeleteService
ControlService
ChangeServiceConfigW
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
EnumServicesStatusExW
CloseServiceHandle
LookupAccountSidW
GetTokenInformation
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CreateProcessAsUserW
OpenProcessToken
shell32
SHFileOperationW
Sections
.text Size: 244KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 4KB - Virtual size: 648B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ