Fire
Static task
static1
Behavioral task
behavioral1
Sample
488bc8de2c7ee59d46ce49ceef9e7848_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
488bc8de2c7ee59d46ce49ceef9e7848_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
488bc8de2c7ee59d46ce49ceef9e7848_JaffaCakes118
-
Size
66KB
-
MD5
488bc8de2c7ee59d46ce49ceef9e7848
-
SHA1
5b2b648aef42dd4242606cdde04d5a361c591c7a
-
SHA256
f8025c174a02de60ec87c3a0ec0e99b9a507c7def0acfbf0843a60c166671506
-
SHA512
e2d703ede8af507619b8b6b0c38b355443c4ea1c6507a86f9dbc3f0c6524dc6ae8b51a5778c80c092f1959a7d292c90350f560af245a5ce62375acd0cac09063
-
SSDEEP
1536:obohiKN56JBrXxXc4RAetTq1xq1j+gMKhnAo2qy:oboV0ZRS3k+gMKhnXQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 488bc8de2c7ee59d46ce49ceef9e7848_JaffaCakes118
Files
-
488bc8de2c7ee59d46ce49ceef9e7848_JaffaCakes118.dll windows:4 windows x86 arch:x86
d66966154bc9b2797a82027828411f4e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
_initterm
_onexit
__dllonexit
longjmp
_setjmp3
_itoa
free
memmove
_purecall
strncmp
atoi
strcmp
_strcmpi
isdigit
_strdup
sscanf
sprintf
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_strlwr
strncpy
memcpy
memcmp
strchr
memset
strstr
strncat
strlen
malloc
??1type_info@@UAE@XZ
_CxxThrowException
strspn
strcspn
tolower
isxdigit
isupper
isspace
ispunct
isprint
islower
isgraph
iscntrl
isalpha
isalnum
strcpy
strcat
advapi32
CryptDeriveKey
CryptGetUserKey
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
CryptDestroyKey
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGenKey
kernel32
GetComputerNameA
GetVolumeInformationA
UnmapViewOfFile
lstrcpynA
CreateFileMappingA
MapViewOfFile
lstrcmpiA
CreateMutexA
WaitForSingleObject
ReleaseMutex
FlushViewOfFile
Sleep
GetCurrentProcess
VirtualProtect
FlushInstructionCache
LocalFree
MultiByteToWideChar
FreeLibrary
VirtualQuery
SetLastError
LeaveCriticalSection
EnterCriticalSection
GetLastError
GetTickCount
TlsSetValue
TlsGetValue
lstrlenA
lstrcpyA
lstrcatA
GetCurrentProcessId
TlsAlloc
GetProcAddress
LoadLibraryA
TlsFree
GetModuleHandleA
GetModuleFileNameA
CreateThread
CreateEventA
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
TerminateThread
WaitForMultipleObjects
SetEvent
SetEndOfFile
WriteFile
SetFilePointer
ReadFile
GetFileSize
CreateFileA
GetWindowsDirectoryA
user32
CallNextHookEx
SetWindowTextA
UpdateWindow
BringWindowToTop
SetForegroundWindow
CharLowerA
FindWindowA
SendMessageA
wsprintfA
EnumWindows
UnhookWindowsHookEx
SetWindowsHookExA
ws2_32
send
recv
closesocket
WSARecv
connect
WSAGetLastError
ntohs
getpeername
WSASend
inet_ntoa
ole32
OleInitialize
CoCreateInstance
OleUninitialize
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetOpenA
InternetConnectA
InternetOpenUrlA
HttpQueryInfoA
InternetGetCookieA
HttpAddRequestHeadersA
InternetQueryOptionA
oleaut32
SysAllocString
VariantClear
SysFreeString
crypt32
CertVerifyCertificateChainPolicy
CertGetCertificateChain
Exports
Exports
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ