ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
4be74b32ef28684779ef11830fa1671c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4be74b32ef28684779ef11830fa1671c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4be74b32ef28684779ef11830fa1671c_JaffaCakes118
-
Size
84KB
-
MD5
4be74b32ef28684779ef11830fa1671c
-
SHA1
a72ada88e350c3b1e26f43aa33cb428779923c32
-
SHA256
c2a4c454589e990fd627557f555140d1415435f0e8a2c7ec10e47e9eeaafba1e
-
SHA512
9b6e2f9a11a8bdf09a111b2476fcced1cb5794e0a8ea8760bbe40d543ec13c5f867e498b8b713ea023e42f82903027dd487c31c602f212c703f351ee063c563b
-
SSDEEP
1536:/IvHJzb3Gpa47OiIVTNI3Tk2MnXMoYI02t:WHJzb73iIVy0nXMoY4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4be74b32ef28684779ef11830fa1671c_JaffaCakes118
Files
-
4be74b32ef28684779ef11830fa1671c_JaffaCakes118.dll windows:4 windows x86 arch:x86
f9948bb913106f2d8713f56a654854e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateThread
SetUnhandledExceptionFilter
WaitForSingleObject
FreeConsole
SetEvent
CreateEventA
GetCurrentThreadId
VirtualProtectEx
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
VirtualAllocEx
GetWindowsDirectoryA
GetProcAddress
LoadLibraryA
FreeLibrary
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
ReadProcessMemory
CloseHandle
GetLastError
DeleteFileA
lstrlenW
WideCharToMultiByte
GetCurrentProcess
WriteProcessMemory
GetTickCount
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
HeapAlloc
HeapFree
Sleep
LCMapStringA
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
UnhandledExceptionFilter
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TlsSetValue
TlsGetValue
ExitThread
GetCommandLineA
GetVersion
RaiseException
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
TlsAlloc
TlsFree
SetLastError
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
user32
GetUserObjectInformationA
CloseDesktop
wsprintfA
FindWindowExA
FindWindowA
OpenInputDesktop
GetWindowThreadProcessId
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetThreadDesktop
advapi32
SetServiceStatus
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegisterServiceCtrlHandlerA
ole32
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
VariantClear
ws2_32
htons
WSAStartup
ntohs
recv
WSAIoctl
setsockopt
bind
socket
gethostbyname
gethostname
wininet
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCloseHandle
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ