Static task
static1
Behavioral task
behavioral1
Sample
4c1f132e34b27c50d3b3c305febec3fb_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c1f132e34b27c50d3b3c305febec3fb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4c1f132e34b27c50d3b3c305febec3fb_JaffaCakes118
-
Size
116KB
-
MD5
4c1f132e34b27c50d3b3c305febec3fb
-
SHA1
e05c6deef84729c700edefe2b6b28b74c8c91076
-
SHA256
958c7b4596b676c54fc89c834d00da7a7889b63a9d854f33a45e53395c9f2b92
-
SHA512
120df3d942328eda84b90bbf1ea7d803a4f0ff4faef5b6e746dce3857b17d1b650d38f2439301432775bd0c0befab291ff438bd188744a764eebf489676d3bf5
-
SSDEEP
3072:3OSLXidnLfohiU3wjjXsKtc5FwmE5TYk0fAJoTnHg6fT:3OSLXkLfohiUAMKtc5FYtKfhnHg6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c1f132e34b27c50d3b3c305febec3fb_JaffaCakes118
Files
-
4c1f132e34b27c50d3b3c305febec3fb_JaffaCakes118.dll windows:4 windows x86 arch:x86
5a9a35f413bdeffe2247e957d047f590
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
dinput
DirectInputCreateW
ole32
PropVariantClear
StgPropertyLengthAsVariant
IsEqualGUID
winmm
auxOutMessage
joyGetPos
mciGetDeviceIDFromElementIDW
midiOutCacheDrumPatches
midiOutGetVolume
mmioCreateChunk
waveOutRestart
waveOutPrepareHeader
waveInStart
waveInReset
timeKillEvent
timeBeginPeriod
shell32
ShellExecuteA
SHFileOperationW
SHGetSpecialFolderPathW
kernel32
lstrlenA
BeginUpdateResourceA
CloseHandle
CreateFileA
CreateSemaphoreA
DeleteCriticalSection
EnumTimeFormatsA
EraseTape
ExitProcess
GetCommandLineA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcessId
GetFileInformationByHandle
GetLogicalDriveStringsW
GetModuleHandleA
GetTempPathW
GetTimeZoneInformation
GetVersionExA
GetVolumePathNameW
GetWindowsDirectoryA
GlobalAlloc
HeapCreate
HeapFree
LocalShrink
MulDiv
OpenJobObjectW
ReadFile
SetConsoleScreenBufferSize
TlsGetValue
WaitForMultipleObjectsEx
_llseek
HeapAlloc
user32
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnumPropsA
GetForegroundWindow
GetKeyState
GetTopWindow
LoadIconA
MessageBoxW
CharToOemA
OpenClipboard
PeekMessageA
RegisterClassA
RegisterShellHookWindow
RemoveMenu
SetRect
SetSystemCursor
SetUserObjectSecurity
ShowWindow
TranslateMessage
UpdateWindow
CharLowerW
CharLowerBuffA
MsgWaitForMultipleObjects
ws2_32
WSAGetLastError
WSAStringToAddressA
WSAUnhookBlockingHook
socket
listen
connect
closesocket
gethostbyname
htons
advapi32
BuildExplicitAccessWithNameW
CancelOverlappedAccess
SystemFunction013
SetUserFileEncryptionKey
SetFileSecurityW
RegRestoreKeyW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LsaQueryTrustedDomainInfo
IsValidSecurityDescriptor
InitializeSecurityDescriptor
GetTrusteeNameW
GetSecurityDescriptorDacl
GetFileSecurityW
GetCurrentHwProfileA
GetAclInformation
GetAce
EqualSid
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ