Static task
static1
Behavioral task
behavioral1
Sample
3ee542d73a23595911696426163dde63_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ee542d73a23595911696426163dde63_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3ee542d73a23595911696426163dde63_JaffaCakes118
-
Size
312KB
-
MD5
3ee542d73a23595911696426163dde63
-
SHA1
4de9ad14a09681eefc90b4b3ba181782063a9d65
-
SHA256
b3df7c174588713bd0e59cd8d43ccba2b55d8cd2a384be345c83f1c99613b277
-
SHA512
65ea75ea7135d9b14520b614d8e85cd174e806294102f4f3c25fca85cc0ba7d7615c746ca56a7ad1409febd7eb8b45ec5be74939e9204fa9831df8307f3aece8
-
SSDEEP
3072:jDFuQXacfWQro47C1qT9KtUN9tLcq5NFFo8/q5oKjs21FNuL6JcoUTzj:lR3O806tL/5Fo8/quN21qLfTv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ee542d73a23595911696426163dde63_JaffaCakes118
Files
-
3ee542d73a23595911696426163dde63_JaffaCakes118.dll windows:4 windows x86 arch:x86
53ee339ac5728b0ff2982790d978dbb6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetFilePointer
GetCurrentProcessId
CopyFileA
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
CreateThread
GetLastError
SetLastError
TerminateThread
DisableThreadLibraryCalls
ReadFile
LocalFree
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
CreateProcessA
GetLocalTime
GetTickCount
FlushFileBuffers
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
WriteFile
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
HeapSize
GetCurrentProcess
GetFileSize
CloseHandle
GetSystemDirectoryA
Sleep
LoadLibraryA
FreeLibrary
CreateFileA
GetVersionExA
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetVersion
GetEnvironmentVariableA
lstrlenW
GetModuleFileNameA
OutputDebugStringA
DebugBreak
InterlockedDecrement
TerminateProcess
ExitProcess
HeapReAlloc
SetUnhandledExceptionFilter
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
HeapFree
GetCommandLineA
RaiseException
RtlUnwind
GetSystemTime
GetTimeZoneInformation
lstrlenA
CreateDirectoryA
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
DeleteFileA
IsBadCodePtr
user32
CharNextA
wvsprintfA
LoadStringA
wsprintfA
GetSystemMetrics
CallNextHookEx
GetClassNameA
SetWindowsHookExA
CharLowerA
UnhookWindowsHookEx
SetTimer
wsprintfW
GetParent
SendMessageTimeoutA
RegisterWindowMessageA
DestroyWindow
SendMessageA
BringWindowToTop
KillTimer
GetActiveWindow
ShowWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
SetActiveWindow
SetForegroundWindow
SetFocus
advapi32
CryptHashData
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
CryptAcquireContextA
CryptCreateHash
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegCloseKey
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
VariantClear
VariantCopy
VariantChangeType
SysAllocStringLen
atl
ord16
ord21
ord30
urlmon
URLDownloadToFileA
wininet
InternetCrackUrlA
InternetOpenUrlA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
InternetOpenA
InternetAttemptConnect
netapi32
Netbios
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.share Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ