Static task
static1
Behavioral task
behavioral1
Sample
37dd1f7f62e5b2c9bea4aef197a16870_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37dd1f7f62e5b2c9bea4aef197a16870_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
37dd1f7f62e5b2c9bea4aef197a16870_JaffaCakes118
-
Size
1.2MB
-
MD5
37dd1f7f62e5b2c9bea4aef197a16870
-
SHA1
68f5f2a0f5848f07b03dba5eca65a29632025446
-
SHA256
5ffac5d85286898095829badbe27ba28c2e10318aa0823cd0cfd528614136a58
-
SHA512
a20f7a05b463348d7bf74e1000b9c89de3b194a3b84862a585f3a04a94ed66302f71a8fa64b0cd80384a61602111ae38a79a2124d2ede7536119cf4b71b5cafe
-
SSDEEP
24576:KMo95mAr98VLPqy2VuAQhSBjPxn9zTUDGmGslYimp64IN:KnGAr92qrkAQIBDfUSBUY/p64c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37dd1f7f62e5b2c9bea4aef197a16870_JaffaCakes118
Files
-
37dd1f7f62e5b2c9bea4aef197a16870_JaffaCakes118.dll windows:4 windows x86 arch:x86
f16826b5a0785e4eb5dc21975d29b6b8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
WritePrivateProfileStringA
GlobalFlags
InterlockedIncrement
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetLocalTime
RaiseException
VirtualAlloc
GlobalFree
GetProcessHeap
ExitProcess
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
CreateProcessA
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CreatePipe
GetExitCodeProcess
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
GetDriveTypeA
SetStdHandle
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GlobalUnlock
LocalFree
GetFullPathNameA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetThreadLocale
DeleteFileA
MoveFileA
SetLastError
GlobalAddAtomA
CreateEventA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
QueryPerformanceCounter
FormatMessageA
LoadLibraryA
FreeLibrary
GetVolumeInformationA
ReadFile
CreateFileA
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
GetLastError
lstrlenA
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
InterlockedExchange
DeleteCriticalSection
InitializeCriticalSection
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
EnterCriticalSection
SetEvent
IsBadReadPtr
GetCommandLineA
GetCurrentDirectoryA
TerminateProcess
WaitForSingleObject
LeaveCriticalSection
GetVersionExA
GetTickCount
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetCurrentProcessId
Sleep
GetModuleHandleA
GetProcAddress
GetModuleFileNameA
OutputDebugStringA
WriteProcessMemory
VirtualProtectEx
ReadProcessMemory
GetCurrentProcess
user32
UnregisterClassA
GetSysColorBrush
DestroyMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindow
DestroyWindow
GetDlgItem
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
ShowWindow
GetActiveWindow
IsWindowVisible
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
RegisterWindowMessageA
LoadCursorA
GetWindowRect
GetParent
GetDC
ReleaseDC
IsWindow
GetSysColor
SetCursor
GetMessagePos
PtInRect
GetClientRect
CharUpperA
SetWindowTextA
EnableWindow
LoadIconA
UnhookWindowsHookEx
CallWindowProcA
SetWindowLongA
SendMessageA
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
wsprintfA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetKeyState
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
MapWindowPoints
SetForegroundWindow
DispatchMessageA
GetMenu
GetWindowPlacement
gdi32
RestoreDC
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
SaveDC
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateBitmap
GetStockObject
Escape
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ws2_32
send
recv
WSAGetLastError
WSACleanup
WSAStartup
connect
htons
WSASocketA
gethostbyname
select
shutdown
closesocket
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 532KB - Virtual size: 530KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 347KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.v-lizer Size: 571KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE