Static task
static1
Behavioral task
behavioral1
Sample
451a6a5b6fbb9952a153c1d18f6632c5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
451a6a5b6fbb9952a153c1d18f6632c5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
451a6a5b6fbb9952a153c1d18f6632c5_JaffaCakes118
-
Size
128KB
-
MD5
451a6a5b6fbb9952a153c1d18f6632c5
-
SHA1
00928a29e9e7a081ee673ea607f220b4906adfb4
-
SHA256
1be63ca740d6daf00c1de8ce8fe5ff6d0ef6eccbf4c0721a119c3d16f92f6b69
-
SHA512
e1f92d09d50e287c7755accbfcf966de3ba71f6a888d53306db8c268d9b4893dc8501b46fcceaebaddbb64602bb076b5fca94a087f1594aa9b0a3fc67ac76e42
-
SSDEEP
3072:KTpCrhBxTUCjAc1Oz28XtGJzkiQXPayA2Lhd7lK+z:4CJfjAc8sJwdXPxn0G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 451a6a5b6fbb9952a153c1d18f6632c5_JaffaCakes118
Files
-
451a6a5b6fbb9952a153c1d18f6632c5_JaffaCakes118.dll windows:4 windows x86 arch:x86
89d85a9687e0ccde37876e3fdf0d2041
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
lstrlenW
lstrlenA
MultiByteToWideChar
GetModuleFileNameA
GetVolumeInformationA
CloseHandle
WriteFile
CreateFileA
GetTickCount
Sleep
MoveFileA
DeleteFileA
ReadFile
GetFileSize
CopyFileA
CreateThread
CreateMutexA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetTempPathA
InterlockedExchange
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetStringTypeW
GetStringTypeA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
GetStartupInfoA
GetFileType
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
LCMapStringA
LCMapStringW
GetOEMCP
GetCPInfo
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
HeapCreate
VirtualFree
IsBadWritePtr
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
VariantClear
SysAllocStringLen
VariantInit
shlwapi
PathFileExistsA
wininet
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ