Static task
static1
Behavioral task
behavioral1
Sample
3b6caed492a1560fa4086b2061e63752_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b6caed492a1560fa4086b2061e63752_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3b6caed492a1560fa4086b2061e63752_JaffaCakes118
-
Size
133KB
-
MD5
3b6caed492a1560fa4086b2061e63752
-
SHA1
8f2b081aed9b1eef402cdc57522ee431e4dc3786
-
SHA256
c987e9a9313629bb4ff14726c1fffca95cb2f6f13dc98642a7def996f67cb4c6
-
SHA512
404c5be14ec78898e151dab7c5c2173fcb3c674eb8ce7aa6eab9820b2e90bde0fc02ca9f85dfe7e1cd6db9b3cde87ebba07a1f80dc281455ad049657488efbe6
-
SSDEEP
3072:sTObXpxVAcR4enPgAO2b937g2elSMqqDLy/g5kS:sqbZYcR4ePPx3CqqDLuU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b6caed492a1560fa4086b2061e63752_JaffaCakes118
Files
-
3b6caed492a1560fa4086b2061e63752_JaffaCakes118.dll windows:4 windows x86 arch:x86
7dbb16bfb34a36a27c32bcc82ccccf49
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemWindowsDirectoryW
CreateMutexW
ProcessIdToSessionId
lstrlenW
WideCharToMultiByte
GetModuleHandleW
ResetEvent
GlobalAlloc
DnsHostnameToComputerNameW
GetTempFileNameW
GetTempPathW
GetFileSize
InterlockedDecrement
HeapDestroy
HeapCreate
GetModuleHandleA
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetSystemInfo
CreateFileMappingW
CreateEventW
CreateThread
SetEvent
LoadLibraryExW
CloseHandle
GetCurrentProcessId
CreateProcessW
lstrcmpW
LocalFree
DisableThreadLibraryCalls
InitializeCriticalSectionAndSpinCount
GetSystemDirectoryW
GetModuleFileNameW
LoadLibraryW
GetProcAddress
FreeLibrary
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapReAlloc
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
GetLocaleInfoA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
InterlockedCompareExchange
ReleaseMutex
WaitForSingleObject
GetTickCount
GetVersionExW
LoadLibraryA
VirtualAlloc
VirtualFree
CreateFileW
LocalAlloc
GetCommandLineA
WriteFile
VirtualProtect
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapFree
GetModuleFileNameA
GetStartupInfoA
RtlUnwind
GetVersionExA
InterlockedExchange
VirtualQuery
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
user32
PostMessageW
GetWindow
GetLastActivePopup
EnableWindow
TranslateMessage
DispatchMessageW
PeekMessageW
SetForegroundWindow
SetFocus
FindWindowW
GetUserObjectInformationW
GetProcessWindowStation
LoadStringW
GetMessageW
SendNotifyMessageW
MessageBoxW
MsgWaitForMultipleObjects
advapi32
RegisterEventSourceW
RegCreateKeyExW
RegDeleteValueW
DeregisterEventSource
ReportEventW
RegCloseKey
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
gdi32
DeleteDC
GetDeviceCaps
CreateDCW
rpcrt4
NdrClientCall2
RpcMgmtIsServerListening
RpcStringFreeW
RpcSmDestroyClientContext
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcBindingSetAuthInfoExW
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ