Static task
static1
Behavioral task
behavioral1
Sample
3b59f8adca7bdcdd47bbcad242e9e0ad_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b59f8adca7bdcdd47bbcad242e9e0ad_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3b59f8adca7bdcdd47bbcad242e9e0ad_JaffaCakes118
-
Size
148KB
-
MD5
3b59f8adca7bdcdd47bbcad242e9e0ad
-
SHA1
8398943e0042a5a425808b773fd3e0d8abee0aa8
-
SHA256
65fef33d9249410723d23a6d1b14703315785648d9648abb10bfd5afca5e2cce
-
SHA512
16a1257cc404254dcc7750b001cc0cf81a1d00def02aa8dbd606c771fc229cb73139e851f02c355b24536bec8e5aa7e141d859ef03afd979d5140d57e94d71f0
-
SSDEEP
3072:Swy5xcVl9O9TqfQqlV6gNysM1oOlo5TAooRn6:Swy3cV7ORCH6gNysI5QwR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b59f8adca7bdcdd47bbcad242e9e0ad_JaffaCakes118
Files
-
3b59f8adca7bdcdd47bbcad242e9e0ad_JaffaCakes118.dll windows:4 windows x86 arch:x86
328f41f374ffcc86977e85c131af684d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateMutexA
OpenMutexA
CloseHandle
GetModuleFileNameA
CreateEventA
GetLastError
ResetEvent
SetEvent
FlushFileBuffers
WriteFile
SetFilePointer
CreateFileA
WaitForMultipleObjects
GetFileAttributesA
GetFileSize
OpenProcess
DeleteFileA
GetSystemDirectoryA
ReleaseMutex
ReadFile
WaitForSingleObject
ResumeThread
CreateThread
TerminateThread
ExitThread
TerminateProcess
WinExec
CopyFileA
GetTempPathA
FreeLibrary
GetProcAddress
LoadLibraryA
MoveFileExA
MoveFileA
lstrcatA
lstrlenA
GetTempFileNameA
GetWindowsDirectoryA
GetShortPathNameA
GetVersion
SetFileAttributesA
SetEnvironmentVariableA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
RtlUnwind
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapAlloc
HeapSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetUnhandledExceptionFilter
GetModuleHandleA
WideCharToMultiByte
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
user32
PostThreadMessageA
shell32
ShellExecuteExA
wininet
InternetReadFile
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
InternetConnectA
InternetSetOptionA
InternetAttemptConnect
InternetCloseHandle
InternetSetStatusCallback
InternetReadFileExA
InternetOpenA
InternetCrackUrlA
HttpOpenRequestA
psapi
EnumProcesses
GetModuleBaseNameA
rpcrt4
UuidToStringA
UuidCreate
netapi32
Netbios
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ