Static task
static1
Behavioral task
behavioral1
Sample
48a4bb04586487fc8cac417f722c0202_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48a4bb04586487fc8cac417f722c0202_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
48a4bb04586487fc8cac417f722c0202_JaffaCakes118
-
Size
100KB
-
MD5
48a4bb04586487fc8cac417f722c0202
-
SHA1
b34742b2803d3a4b6b47d8711ce3b8e85c7dccbb
-
SHA256
40897f711783fb8b91a9726def4a117a235639394079bd48a2426070b8ab667e
-
SHA512
4ba5d5a3c018a2c8ffb274a09d5c3e684d734bc5a28e1440885b4c70969908944efadc082b94bb98e8404584308beeaef4b5f0b89108586485a9cad6225dea46
-
SSDEEP
1536:meKYn2L+RO7+XANaVDQV5lGe3DIcOIafx070k2MSFC2A3A/8h:+H1+XqaVDq3DIBIcx070N7A3A0h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48a4bb04586487fc8cac417f722c0202_JaffaCakes118
Files
-
48a4bb04586487fc8cac417f722c0202_JaffaCakes118.dll windows:4 windows x86 arch:x86
1f27efcd5c6578e624f287bc4641180c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateThread
TerminateThread
GetTickCount
GetWindowsDirectoryA
GetSystemDirectoryA
GetLocalTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
MultiByteToWideChar
WaitForMultipleObjects
GetSystemInfo
FreeLibrary
GetProcAddress
LoadLibraryA
OpenEventA
SetErrorMode
CreateMutexA
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
GetCurrentThreadId
GetVersionExA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
PeekNamedPipe
user32
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
SystemParametersInfoA
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenDesktopA
SendMessageA
BlockInput
DestroyCursor
LoadCursorA
CharNextA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetThreadDesktop
GetWindowTextA
ExitWindowsEx
MessageBoxA
wsprintfA
ShowWindow
FindWindowA
FindWindowExA
GetDC
PostMessageA
CreateWindowExA
CloseWindow
IsWindow
GetUserObjectInformationA
OpenInputDesktop
gdi32
CreateCompatibleBitmap
GetDIBits
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
BitBlt
SelectObject
advapi32
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
AdjustTokenPrivileges
shell32
SHGetFileInfoA
msvcrt
_errno
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
fopen
fwrite
fclose
exit
_strcmpi
strcat
strncmp
strchr
strncpy
wcscpy
atoi
strcpy
strcmp
strrchr
_except_handler3
malloc
free
_CxxThrowException
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strstr
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
ws2_32
listen
bind
getsockname
sendto
recvfrom
__WSAFDIsSet
getpeername
accept
inet_addr
inet_ntoa
send
select
recv
closesocket
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
ntohs
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
netapi32
NetUserAdd
NetLocalGroupAddMembers
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICClose
ICCompressorFree
ICOpen
ICSeqCompressFrameStart
ICSendMessage
ICSeqCompressFrameEnd
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
math Size: 4KB - Virtual size: 535B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ