WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
3d44082cec289a94e9963f6c69d771e1_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d44082cec289a94e9963f6c69d771e1_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3d44082cec289a94e9963f6c69d771e1_JaffaCakes118
-
Size
54KB
-
MD5
3d44082cec289a94e9963f6c69d771e1
-
SHA1
afebb7aa1d9714bc53d4e96b6abb4b22323680a7
-
SHA256
c47be2f2a3da062c0f4decfbb6514e15401d094dc2fa6a8c3e70daf82c90fcff
-
SHA512
c769e25182387a0bf530e876bd0af2abc6f0944206588c16ef4921d3173f74f0206ed0a9e64fbc4f2caa3a59bb4144b4b28b6c170dc509e85a62f5df3ee7980c
-
SSDEEP
768:Ur202x9cjvxGr+2k+6WADBPVDXUxuuKmG88vG8Qm3sRg1rV9kMeUuOBhLYr6Yu/R:WWsor3HqDkxbG8osRglwhssmnR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d44082cec289a94e9963f6c69d771e1_JaffaCakes118
Files
-
3d44082cec289a94e9963f6c69d771e1_JaffaCakes118.dll windows:4 windows x86 arch:x86
7a68df82289de46fd73474441e38b94e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord2770
ord356
ord5683
ord2614
ord924
ord2784
ord1980
ord668
ord6876
ord5710
ord4129
ord860
ord1615
ord5773
ord5442
ord4204
ord665
ord354
ord958
ord5186
ord539
ord2764
ord4202
ord5603
ord940
ord536
ord825
ord923
ord939
ord1105
ord6140
ord2061
ord858
ord4277
ord922
ord538
ord5572
ord2915
ord5858
ord537
ord341
ord654
ord540
ord2818
ord535
ord800
ord610
ord287
ord3575
ord5812
ord6394
ord6383
ord5440
ord5450
ord6139
ord823
ord2107
ord3663
ord2841
msvcrt
_adjust_fdiv
malloc
_initterm
free
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
__CxxFrameHandler
memmove
_access
exit
_mbsicmp
_mbscmp
_purecall
kernel32
SetLastError
GetModuleHandleA
GetVolumeInformationA
SetFileAttributesA
MoveFileExA
GetModuleFileNameA
ExpandEnvironmentStringsA
GetCurrentThreadId
GlobalFree
GlobalAlloc
ReleaseMutex
CloseHandle
CreateMutexA
WriteProcessMemory
IsBadReadPtr
GetCurrentDirectoryA
GetCurrentProcessId
Sleep
GetLastError
CreateFileA
GetProcAddress
DeleteFileA
FreeLibrary
MoveFileA
GetTickCount
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
GetTempPathA
GetSystemDirectoryA
SetFileTime
GetFileAttributesA
GetFileAttributesExA
OpenMutexA
WriteFile
LoadLibraryA
EnterCriticalSection
GetTempFileNameA
ws2_32
send
recv
WSADuplicateSocketA
select
WSASocketA
WSAStartup
WSCEnumProtocols
WSCGetProviderPath
bind
inet_addr
htonl
gethostname
socket
connect
gethostbyname
ntohs
getpeername
getsockname
accept
closesocket
htons
__WSAFDIsSet
imagehlp
MapFileAndCheckSumA
Exports
Exports
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ