?QQStart@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
4207fa60749fa23e81ddfcfb5f4c988e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4207fa60749fa23e81ddfcfb5f4c988e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4207fa60749fa23e81ddfcfb5f4c988e_JaffaCakes118
-
Size
66KB
-
MD5
4207fa60749fa23e81ddfcfb5f4c988e
-
SHA1
15096992b03cb90f3bc3111d7a9ac2fe4f8a2ffc
-
SHA256
87b01d6fa1d3dc3790ce06ba731a54aa8e26df81643ac3e24bbabb7d4f3be285
-
SHA512
7badea135f375d3329cc46fc68d4d42106f6ef1fe0e56071272aae1624b7159ec1d089c1e4ca65689c087d0266fda7b996ce54904690a921bd158df34852c350
-
SSDEEP
1536:Tqees+Pia3xPKwzHKfw02Y8rkaVINMwmpYm:fehVqf2lrnINM5O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4207fa60749fa23e81ddfcfb5f4c988e_JaffaCakes118
Files
-
4207fa60749fa23e81ddfcfb5f4c988e_JaffaCakes118.dll windows:4 windows x86 arch:x86
02401518d107128bbe4f985673634a06
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
sndPlaySoundA
urlmon
URLDownloadToFileA
wininet
DeleteUrlCacheEntry
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
kernel32
lstrcpynA
GetModuleHandleA
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
OpenProcess
CreateThread
GetLastError
GetModuleFileNameA
GetProcAddress
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
GetPrivateProfileStringA
GetTickCount
GetVersionExA
WriteFile
CreateFileA
SetFilePointer
GetLocalTime
ReadFile
GetPrivateProfileIntA
LocalFree
FindResourceA
LoadResource
SizeofResource
GlobalLock
GlobalUnlock
MultiByteToWideChar
Sleep
DeleteFileA
ExitProcess
GlobalAlloc
GlobalFree
CreateDirectoryA
LocalAlloc
CreateMutexA
user32
LoadIconA
GetWindowTextA
FindWindowExA
FindWindowA
GetWindowThreadProcessId
SendMessageA
CharLowerA
SetWindowLongA
GetWindowLongA
CreateDialogParamA
IsWindow
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
RegisterClassExA
UpdateWindow
CreateWindowExA
PostQuitMessage
DestroyIcon
SetWindowPos
SetWindowRgn
GetCursorPos
GetDC
GetClassLongA
FillRect
ReleaseDC
MoveWindow
SetTimer
DefWindowProcA
ShowWindow
PtInRect
LoadCursorA
SetCursor
KillTimer
GetWindowDC
wsprintfA
GetWindowRect
GetSystemMetrics
gdi32
SelectObject
BitBlt
GetObjectA
CreateCompatibleDC
CreatePolygonRgn
TextOutA
SetTextColor
CreateFontA
SetPixel
SetBkMode
GetTextExtentPoint32A
GetStockObject
LineTo
MoveToEx
CreatePen
Rectangle
CreateSolidBrush
CreateCompatibleBitmap
StretchBlt
DeleteObject
advapi32
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCloseKey
shell32
ShellExecuteA
Shell_NotifyIconA
ole32
CreateStreamOnHGlobal
gdiplus
GdiplusShutdown
GdipLoadImageFromStream
GdipCreateBitmapFromFile
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdipDisposeImage
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ