Startup
Static task
static1
Behavioral task
behavioral1
Sample
34364982deed8235881ef40a9d8179ce_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34364982deed8235881ef40a9d8179ce_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
34364982deed8235881ef40a9d8179ce_JaffaCakes118
-
Size
8KB
-
MD5
34364982deed8235881ef40a9d8179ce
-
SHA1
c99805f5762afc0fb70e7002d8d888602e3879bd
-
SHA256
f37a7acbdb5aec96c3a4b0b67af7e9eb2d8935e62d8701bda6fc10b6594a3076
-
SHA512
c0210636de80de480ccc32bca7e390e9c73ef6eed041471d6f99fe00d1ef470b6982104913880448a5c589fe930385a746f0aba59348a06e71c28528bfedba4e
-
SSDEEP
96:M2gVQPtUvS5qvZUxbgRIILKyhe21Pt/jgzH2QoOo3AJZVfUoQQ:pgqqvZUhZILKyL1VPQ8QJZVf+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34364982deed8235881ef40a9d8179ce_JaffaCakes118
Files
-
34364982deed8235881ef40a9d8179ce_JaffaCakes118.dll windows:4 windows x86 arch:x86
b1a51dcbb456103defff670218ab10f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
_snprintf
strncmp
isdigit
atoi
sprintf
strcpy
_chkstk
_vsnprintf
strcat
strlen
memcpy
memset
kernel32
GetTickCount
CreateDirectoryA
GetSystemDirectoryA
CreateProcessA
WaitForMultipleObjects
Sleep
GetLastError
CreateMutexA
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetVolumeInformationA
GetDiskFreeSpaceA
GlobalMemoryStatusEx
GetVersionExA
GetWindowsDirectoryA
WriteFile
ExitProcess
ReadFile
FreeConsole
CloseHandle
CreateFileA
CreateThread
GetStdHandle
AllocConsole
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GetProcAddress
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ