Fire
Static task
static1
Behavioral task
behavioral1
Sample
38173137e1f43acbfdb2361eb41fc3f6_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38173137e1f43acbfdb2361eb41fc3f6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
38173137e1f43acbfdb2361eb41fc3f6_JaffaCakes118
-
Size
65KB
-
MD5
38173137e1f43acbfdb2361eb41fc3f6
-
SHA1
5845c7c8aae2715bff11d0217708e068a403f062
-
SHA256
2abc6495c291078a32f887bcc513c00570d0424cf5d0380bef887185f542ad9e
-
SHA512
74b266545e5c2a844664ecf0a7bb129b48edbbc345e957a874520a35fbb0a9fd2feb515715e528251c2343c97c842cc1a8944dfad2552a218c64bad18baa5a29
-
SSDEEP
1536:XSpglL4WVkr4XADZ+ETqLoV5SW8gRYhnAAhy:XS64wkVMNgRYhnLQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38173137e1f43acbfdb2361eb41fc3f6_JaffaCakes118
Files
-
38173137e1f43acbfdb2361eb41fc3f6_JaffaCakes118.dll windows:4 windows x86 arch:x86
fa24859e936da75a5d98d978a2880d8c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
_initterm
_onexit
__dllonexit
longjmp
_setjmp3
_itoa
free
memmove
_purecall
strncmp
atoi
strcmp
_strcmpi
isdigit
_strdup
sscanf
sprintf
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_strlwr
strncpy
memcpy
memcmp
strchr
memset
strstr
strncat
strlen
malloc
??1type_info@@UAE@XZ
_CxxThrowException
strspn
strcspn
tolower
isxdigit
isupper
isspace
ispunct
isprint
islower
isgraph
iscntrl
isalpha
isalnum
strcpy
strcat
advapi32
CryptDeriveKey
CryptGetUserKey
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
CryptDestroyKey
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGenKey
kernel32
GetComputerNameA
GetVolumeInformationA
UnmapViewOfFile
lstrcpynA
CreateFileMappingA
MapViewOfFile
lstrcmpiA
CreateMutexA
WaitForSingleObject
ReleaseMutex
FlushViewOfFile
Sleep
GetCurrentProcess
VirtualProtect
FlushInstructionCache
LocalFree
MultiByteToWideChar
FreeLibrary
VirtualQuery
SetLastError
LeaveCriticalSection
EnterCriticalSection
GetLastError
GetTickCount
TlsSetValue
TlsGetValue
lstrlenA
GetCurrentProcessId
TlsAlloc
GetProcAddress
LoadLibraryA
TlsFree
GetModuleHandleA
GetModuleFileNameA
CreateThread
CreateEventA
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
TerminateThread
WaitForMultipleObjects
SetEvent
lstrcpyA
SetEndOfFile
WriteFile
SetFilePointer
ReadFile
GetFileSize
CreateFileA
GetWindowsDirectoryA
user32
CallNextHookEx
SetWindowTextA
UpdateWindow
BringWindowToTop
SetForegroundWindow
CharLowerA
FindWindowA
SendMessageA
wsprintfA
EnumWindows
UnhookWindowsHookEx
SetWindowsHookExA
ws2_32
send
recv
closesocket
WSARecv
connect
WSAGetLastError
ntohs
getpeername
WSASend
inet_ntoa
ole32
OleInitialize
CoCreateInstance
OleUninitialize
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetOpenA
InternetConnectA
InternetOpenUrlA
HttpQueryInfoA
InternetSetCookieA
InternetGetCookieA
HttpAddRequestHeadersA
InternetQueryOptionA
oleaut32
SysAllocString
VariantClear
SysFreeString
crypt32
CertVerifyCertificateChainPolicy
CertGetCertificateChain
Exports
Exports
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ