Static task
static1
Behavioral task
behavioral1
Sample
360a0cfcfc66492b39c1f3ef61eda01c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
360a0cfcfc66492b39c1f3ef61eda01c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
360a0cfcfc66492b39c1f3ef61eda01c_JaffaCakes118
-
Size
27KB
-
MD5
360a0cfcfc66492b39c1f3ef61eda01c
-
SHA1
fd01a202bb9c56508b21b14874812ba8d0256ddc
-
SHA256
8467fb0a8a0acb18402e57633aa4028e4e776f0060b61b77220ceff6a39ebc78
-
SHA512
cf4b52bc586b66c0f0cab06499fe15019a6a4e7a96441d2734e55530ada69542431a90dc83d69a6154c50036b5e2dce7d59474344d9f2b72d3f3730c6461005d
-
SSDEEP
768:W0Q09Tvi2CWCkWhi2SNBxD6WR+JB7jSNVz1ob:59TviHmB16WRM7uNVzI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 360a0cfcfc66492b39c1f3ef61eda01c_JaffaCakes118
Files
-
360a0cfcfc66492b39c1f3ef61eda01c_JaffaCakes118.dll windows:4 windows x86 arch:x86
c0c3d6af4ccc786cffc9c2db8e23384f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtectEx
TerminateProcess
TerminateThread
IsBadReadPtr
GetPrivateProfileStringA
RaiseException
WideCharToMultiByte
GetModuleHandleA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
ReadProcessMemory
GetCurrentThread
Process32Next
InitializeCriticalSection
CreateToolhelp32Snapshot
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
Sleep
CreateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
EnterCriticalSection
LeaveCriticalSection
LoadLibraryA
GetProcAddress
GetCurrentProcessId
CreateMutexA
Process32First
GetLastError
user32
GetWindowTextA
GetForegroundWindow
FindWindowA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
ws2_32
WSASetLastError
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
msvcrt
sscanf
_strlwr
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
strrchr
wcslen
strcmp
fopen
strcat
sprintf
strcpy
memcpy
atoi
strchr
memset
??2@YAPAXI@Z
strncpy
??3@YAXPAX@Z
_strnicmp
strlen
strstr
fclose
fread
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ