fsvizuwfdosjn.r2e
Static task
static1
Behavioral task
behavioral1
Sample
4a8531111f5b499b647f2ff22eb03d13_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a8531111f5b499b647f2ff22eb03d13_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4a8531111f5b499b647f2ff22eb03d13_JaffaCakes118
-
Size
136KB
-
MD5
4a8531111f5b499b647f2ff22eb03d13
-
SHA1
682c8b5df1701254b803dd1dffcc23bd98d2532d
-
SHA256
66e4aa85e70651b4744dbef6e4d9fe6783e951ffc681bbf04bd17c2e78d6a5e7
-
SHA512
4aef5066ba340b8385b4ec138574b99b9bc0fa3cca77763bc52b8c66be43d808a2f0895043368b91071de736f53e1444df70754ce66cfe0b709d1e544b87fff8
-
SSDEEP
3072:zoYDflk8To/6ba3CTzLriJ778IkZZiiPjJDCP2b7:sYLljE4zLW149OYJoA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a8531111f5b499b647f2ff22eb03d13_JaffaCakes118
Files
-
4a8531111f5b499b647f2ff22eb03d13_JaffaCakes118.dll windows:4 windows x86 arch:x86
79fc9ca2324d334e8839401d05ffb970
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
ResetEvent
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSection
lstrcpyW
lstrcatW
SetLastError
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetLastError
FreeEnvironmentStringsA
GetProcAddress
LoadLibraryExW
Sleep
InterlockedCompareExchange
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
IsBadCodePtr
IsBadReadPtr
VirtualQuery
IsBadWritePtr
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
HeapSize
HeapReAlloc
HeapAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
InterlockedExchangeAdd
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
InterlockedDecrement
GetModuleFileNameA
GetStdHandle
WriteFile
GetModuleHandleA
RaiseException
RtlUnwind
GetVersionExA
GetCommandLineA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateNamedPipeA
ConnectNamedPipe
ReadFile
DisconnectNamedPipe
CreateTimerQueueTimer
CreateEventA
CreateThread
WaitForMultipleObjects
InterlockedExchange
DeleteTimerQueueTimer
ExitProcess
GetCurrentProcessId
InterlockedIncrement
GetCurrentProcess
DuplicateHandle
CloseHandle
OpenProcess
SetEvent
MoveFileA
CreateMutexW
GetStartupInfoA
ReleaseMutex
user32
wsprintfW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Exports
Exports
quwhi
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 642B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ