load
Static task
static1
Behavioral task
behavioral1
Sample
3d4b6ac091f691dadbef6be386de0c16_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d4b6ac091f691dadbef6be386de0c16_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3d4b6ac091f691dadbef6be386de0c16_JaffaCakes118
-
Size
6KB
-
MD5
3d4b6ac091f691dadbef6be386de0c16
-
SHA1
102eac47220aab7ccef8c3def01f49464293fe52
-
SHA256
d184541af29a366b418a9129370aea21db1a23eb6a4d4039ca8a3e7a6cd7c84b
-
SHA512
1c1211751d634fab899bdc491823c763b8270619e1e255533207655b3a4e05929c6631466b9ea19b396f35162cd3cadd8220e2014959b79fba55af31bea5dd82
-
SSDEEP
96:0sGm2iQZkrbDg7wTvRyT1STMY5Lynx1lIk1TMTfyPVjDB:QNSHcwTITATMYUn1Ik1TMTyPV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d4b6ac091f691dadbef6be386de0c16_JaffaCakes118
Files
-
3d4b6ac091f691dadbef6be386de0c16_JaffaCakes118.dll windows:4 windows x86 arch:x86
11b72b460bd247f719b5b1bdf9440c38
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wsock32
socket
WSAGetLastError
htons
inet_ntoa
connect
select
__WSAFDIsSet
getsockopt
setsockopt
shutdown
closesocket
WSAStartup
inet_addr
ioctlsocket
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
kernel32
WinExec
GetTickCount
ExitProcess
Sleep
GetSystemDirectoryA
user32
GetMessageA
DispatchMessageA
TranslateMessage
msvcrt
_initterm
free
strncmp
strcpy
strcat
strstr
_ftol
_beginthread
malloc
fwrite
vsprintf
printf
fopen
fclose
_adjust_fdiv
memset
Exports
Exports
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ