Static task
static1
Behavioral task
behavioral1
Sample
35a4f744b3a13b1393207e5f71d0c1d4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35a4f744b3a13b1393207e5f71d0c1d4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
35a4f744b3a13b1393207e5f71d0c1d4_JaffaCakes118
-
Size
40KB
-
MD5
35a4f744b3a13b1393207e5f71d0c1d4
-
SHA1
c22e512af46071da520820fce224fcd234ccbad4
-
SHA256
9443910eec32ae9563c45fa85da2b028d21b6948902772c0201776773044cec8
-
SHA512
481695b61f495db877836172dcde4336053ac67bb73b6fbebf1176c229dea3787048d4a1c160762052e0e8f6e1d4679bb5d6a9124d61e90b0111623649cfbe3b
-
SSDEEP
384:UzkeELmXOBPpGQciaXOjLalO6calO61DB9v1GK1tsZ21nO:YIPpuXgLKuK7D/tsZ2E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35a4f744b3a13b1393207e5f71d0c1d4_JaffaCakes118
Files
-
35a4f744b3a13b1393207e5f71d0c1d4_JaffaCakes118.dll windows:4 windows x86 arch:x86
46d11ce09abe1c0a86e943da5cf319f2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42u
ord2793
ord1917
ord4913
ord1165
ord1863
ord3658
ord5436
ord2732
ord879
ord6379
ord882
ord4269
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord2717
ord4074
ord4692
ord5303
ord5285
ord5710
ord2977
ord3142
ord3254
ord957
ord354
ord3257
ord2980
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4616
ord4418
ord3733
ord561
ord815
ord860
ord2021
ord2069
ord1568
ord3948
ord1244
ord1173
ord1570
ord1179
ord342
ord1240
ord1194
ord1563
ord1248
ord1250
ord6466
ord1571
ord823
ord524
ord273
ord603
ord791
ord825
ord523
ord967
ord1987
ord5475
ord5793
ord4969
ord4857
ord4329
ord4441
ord4405
ord2024
ord5478
ord5807
ord4773
ord5304
ord3313
ord5769
ord1971
ord861
ord858
ord5180
ord6381
ord2385
ord4459
ord540
ord600
ord826
ord269
ord538
ord665
ord800
ord942
ord3131
ord535
ord1115
msvcrt
__CxxFrameHandler
_beginthreadex
_EH_prolog
??1type_info@@UAE@XZ
__dllonexit
_onexit
free
_initterm
malloc
_adjust_fdiv
kernel32
LocalFree
CreateMutexW
WaitForSingleObject
ReleaseMutex
GetCommandLineW
GetModuleHandleW
GetSystemInfo
GetDriveTypeW
GlobalAlloc
CreatePipe
CreateProcessW
Sleep
PeekNamedPipe
ReadFile
WideCharToMultiByte
WriteFile
GlobalSize
GlobalFree
DeleteFileW
GetSystemDirectoryW
lstrcpynW
lstrlenW
lstrcatW
FindFirstFileW
FileTimeToLocalFileTime
lstrcpyW
FileTimeToSystemTime
FindNextFileW
FindClose
LocalAlloc
user32
SetTimer
GetMessageW
TranslateMessage
DispatchMessageW
wsprintfW
PeekMessageW
PostThreadMessageW
advapi32
RegCloseKey
RegCreateKeyExA
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueA
shell32
ShellExecuteW
wsock32
gethostname
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inidata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ