Static task
static1
Behavioral task
behavioral1
Sample
3c14f82908a52e858289cd681ebc1297_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c14f82908a52e858289cd681ebc1297_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3c14f82908a52e858289cd681ebc1297_JaffaCakes118
-
Size
112KB
-
MD5
3c14f82908a52e858289cd681ebc1297
-
SHA1
b405ea7c674eccf830896ca7e4c68df9e1789eda
-
SHA256
d8c0205b67206e54204cc071d17aa6bbd6f54c25337d125afb5229bec9be5f6f
-
SHA512
044976e1dbf1f5676ff6b3226c088bfc62144186ce33c12a60824fc60831ac458d9d51833b39117dd43b6a196de4306d0f2de7d4e461cecc0be1693638d93c41
-
SSDEEP
1536:eGOvAXApWcII+TXEsZT8d/zY6W4ozp2Hm2SnAfoRqsGAvwoZYTR:eGOvAosTM/zsp2nSnYoRqr+T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c14f82908a52e858289cd681ebc1297_JaffaCakes118
Files
-
3c14f82908a52e858289cd681ebc1297_JaffaCakes118.dll windows:4 windows x86 arch:x86
b87d6ab90b36dc5f93c28e1fc2f019aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetFilePointer
FlushFileBuffers
SetEndOfFile
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapSize
HeapReAlloc
TerminateProcess
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
GetOEMCP
GetCPInfo
GlobalFlags
lstrcmpA
GetProcessVersion
FreeLibrary
lstrcatA
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetCurrentThreadId
MultiByteToWideChar
InterlockedDecrement
LocalReAlloc
EnterCriticalSection
GlobalAlloc
GlobalReAlloc
GlobalLock
LeaveCriticalSection
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
LocalAlloc
lstrcpynA
TerminateThread
TlsFree
TlsAlloc
InterlockedIncrement
GetLastError
TlsGetValue
TlsSetValue
SetLastError
lstrlenA
GetCurrentProcessId
CreateThread
LoadLibraryA
LocalFree
GetCurrentProcess
ExitProcess
VirtualProtect
WriteFile
WideCharToMultiByte
ReadFile
GetVersion
GetTickCount
GetModuleFileNameW
GetLocalTime
GetCommandLineA
DeleteFileA
Sleep
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
CreateFileA
DeviceIoControl
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
LoadCursorA
GetSysColorBrush
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
LoadStringA
UnhookWindowsHookEx
SetWindowTextA
EndDialog
CopyRect
GetSubMenu
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
EnableWindow
GetDC
wsprintfA
ReleaseDC
DialogBoxParamA
GetDlgItemTextA
SetDlgItemTextA
MessageBoxA
GetClientRect
EnableMenuItem
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
ExtTextOutA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
TextOutA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
RegSetValueExA
comctl32
ord17
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ