tcpG4T
Static task
static1
Behavioral task
behavioral1
Sample
427faa16682bca14a02a47daac27f6d8_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
427faa16682bca14a02a47daac27f6d8_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
427faa16682bca14a02a47daac27f6d8_JaffaCakes118
-
Size
24KB
-
MD5
427faa16682bca14a02a47daac27f6d8
-
SHA1
a7ff88b02e056e0511db88261a07853ece215d63
-
SHA256
e9f2ad9afbb95c72b7da4042b51df3fc53df3dda9d953ac16259dd1f81073b9d
-
SHA512
d372c8b5dc330e6e20a2d621a5fa142750cb93c286a6fef23d3dd948541970493d393f1b8b9185adaa503d2ed24288d4ce010979163623562ef85d28432229d4
-
SSDEEP
768:x9Yh1j1Vu4vTwfh3SxAfu1zrinv89oFT1xDpEEi:xSBzriv82DCf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 427faa16682bca14a02a47daac27f6d8_JaffaCakes118
Files
-
427faa16682bca14a02a47daac27f6d8_JaffaCakes118.dll windows:4 windows x86 arch:x86
a104c71608154f4106ffa57e2f77a807
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
GetClassNameA
CharLowerA
wsprintfA
kernel32
CreateNamedPipeA
CreatePipe
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
GetTempPathA
GetTickCount
HeapAlloc
HeapFree
IsBadCodePtr
CreateFileMappingA
LocalAlloc
LocalFree
LockFile
MapViewOfFile
OpenProcess
RtlZeroMemory
Sleep
TerminateProcess
TerminateThread
UnmapViewOfFile
VirtualAlloc
VirtualProtectEx
WaitForSingleObject
ord5
_llseek
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateFileA
CreateEventA
CreateDirectoryA
ConnectNamedPipe
CloseHandle
LoadLibraryA
WideCharToMultiByte
CreateNamedPipeA
CreatePipe
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
GetTempPathA
GetTickCount
HeapAlloc
HeapFree
IsBadCodePtr
CreateFileMappingA
LocalAlloc
LocalFree
LockFile
MapViewOfFile
OpenProcess
RtlZeroMemory
Sleep
TerminateProcess
TerminateThread
UnmapViewOfFile
VirtualAlloc
VirtualProtectEx
WaitForSingleObject
ord5
_llseek
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateFileA
CreateEventA
CreateDirectoryA
ConnectNamedPipe
CloseHandle
LoadLibraryA
WideCharToMultiByte
shell32
ShellExecuteA
advapi32
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
RegNotifyChangeKeyValue
RegOpenKeyExA
RegDeleteKeyA
wininet
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetQueryDataAvailable
InternetReadFile
HttpOpenRequestA
ws2_32
accept
WSAStartup
WSACleanup
closesocket
connect
gethostbyname
htons
inet_addr
listen
recv
send
socket
bind
ole32
CoTaskMemFree
urlmon
URLDownloadToFileA
Exports
Exports
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ