SGVXBPILF
Static task
static1
Behavioral task
behavioral1
Sample
4321c5604e83d6607ee2583842f5c39c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4321c5604e83d6607ee2583842f5c39c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4321c5604e83d6607ee2583842f5c39c_JaffaCakes118
-
Size
144KB
-
MD5
4321c5604e83d6607ee2583842f5c39c
-
SHA1
a8f0b7c61bcce0fe1d83fbb93bac57990de5546a
-
SHA256
0b493c8602e11312d348d99bbff0517fcb4721125c48edf22ddcabf4d6e58df2
-
SHA512
2f9ffd5729a91ba1d65e43ce198cd4a6c5790368a4979ef2eafec8129eb7daa2a26985eebbd85c36f97c4556ddaad36357efd8d7d80e790c82fa380811074e57
-
SSDEEP
3072:ljEvr+AMX2zJvHBhgnL89ipsmeHrqQp7rplgpas7ilP:lsMX2zJvhhgrum+Uas7G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4321c5604e83d6607ee2583842f5c39c_JaffaCakes118
Files
-
4321c5604e83d6607ee2583842f5c39c_JaffaCakes118.dll windows:4 windows x86 arch:x86
815650827b2b886007f1fd1ba18ce841
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
GetSecurityDescriptorGroup
GetSecurityDescriptorLength
GetTraceEnableLevel
RemoveTraceCallback
SetEntriesInAuditListA
SystemFunction012
RegCloseKey
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
AllocateLocallyUniqueId
ConvertSecurityDescriptorToAccessNamedW
RegConnectRegistryW
RegDeleteKeyW
RegEnumKeyExW
gdi32
CreateEnhMetaFileW
DeleteObject
PlayMetaFile
SetFontEnumeration
GetRegionData
kernel32
RaiseException
CancelTimerQueueTimer
CloseHandle
CreateEventA
CreateFileA
DeleteCriticalSection
GetFileAttributesW
GetFileSize
GetLastError
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
SetLastError
lstrlenA
LoadResource
FindResourceA
GetCommandLineA
VirtualAlloc
CreateFileMappingA
CreateMutexA
GetFileAttributesA
GetPrivateProfileStringA
GetPrivateProfileStringW
GetProcAddress
GetStringTypeExA
GetStringTypeExW
GetSystemDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
IsBadCodePtr
IsBadReadPtr
IsValidCodePage
LoadLibraryA
MapViewOfFile
MultiByteToWideChar
ReleaseMutex
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
lstrcmpiA
lstrcmpiW
lstrcpyA
FreeLibrary
GetComputerNameW
GetLogicalDriveStringsA
GetModuleFileNameW
GetModuleHandleW
GetSystemDefaultLangID
IsBadWritePtr
LocalFree
OpenSemaphoreW
SetConsoleTitleW
SetSystemTimeAdjustment
CompareStringW
CompareStringA
GetLocaleInfoW
GetSystemInfo
VirtualProtect
GetTimeZoneInformation
GetCurrentProcessId
SetEnvironmentVariableA
GetTickCount
QueryPerformanceCounter
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
HeapSize
VirtualQuery
RtlUnwind
InitializeCriticalSection
HeapReAlloc
GetCPInfo
GetOEMCP
GetACP
EnterCriticalSection
FatalAppExitA
LeaveCriticalSection
WriteFile
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetCurrentThreadId
GetVersionExA
ExitProcess
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
ole32
StringFromCLSID
CoTaskMemFree
CoTaskMemAlloc
StgCreateDocfile
ReleaseStgMedium
OleSaveToStream
OleLoadFromStream
GetRunningObjectTable
CreateStreamOnHGlobal
CreateGenericComposite
CreateFileMoniker
CreateBindCtx
CoGetMarshalSizeMax
CoCreateInstance
CreateClassMoniker
GetHGlobalFromStream
oleaut32
VarCyInt
VarUI4FromDec
LPSAFEARRAY_UserMarshal
rpcrt4
NdrEncapsulatedUnionMarshall
RpcBindingInqAuthInfoExA
NdrMesTypeEncode
RpcMgmtEnableIdleCleanup
I_RpcNsInterfaceUnexported
user32
FindWindowExA
UnionRect
GetCapture
IntersectRect
DefDlgProcW
CharUpperA
wsprintfA
CallNextHookEx
CreateAcceleratorTableA
LoadStringW
RegisterClipboardFormatW
UnhookWindowsHookEx
SetRectEmpty
Exports
Exports
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ