Ojoxfhafcbb
Static task
static1
Behavioral task
behavioral1
Sample
4c1423eddc919affb86bd67b43a42462_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c1423eddc919affb86bd67b43a42462_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4c1423eddc919affb86bd67b43a42462_JaffaCakes118
-
Size
130KB
-
MD5
4c1423eddc919affb86bd67b43a42462
-
SHA1
4bf5a6ef5a285a80f3f963ef9cf052c812865850
-
SHA256
03da474de11f3f98c0a4ddbed5dc588b76973c6708ca1f0fadee44a6f72d321a
-
SHA512
8698810fd1b486b41e2a7e0a2aa9c1937132d88d3c45e07e62f11baf1d11337985a473ee576f214289b0fff5f9c0f712bb9abb2b85ee4863e8cdc35272058855
-
SSDEEP
1536:Y2ZAh9wJua1ZRIbI+e2BrMg8LiyKTGmFX7tb2P5OxMLBXpJjBhScMzW:tIwYNU3LipGeX7tkPLbJniC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c1423eddc919affb86bd67b43a42462_JaffaCakes118
Files
-
4c1423eddc919affb86bd67b43a42462_JaffaCakes118.dll windows:4 windows x86 arch:x86
f0e5123c8f1651ff41cba579003964b4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
StartTraceW
SystemFunction005
RegCloseKey
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueA
gdi32
DeleteObject
kernel32
CloseHandle
CreateFileA
DeleteFileA
FreeLibrary
GetCurrentProcess
GetLastError
GetPrivateProfileStringA
GetProcAddress
GetProfileIntA
LoadLibraryA
MoveFileA
SearchPathA
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
WriteFile
lstrcatA
lstrcpyA
lstrlenA
VirtualAlloc
CreateMutexA
GetTickCount
GlobalAlloc
GlobalFree
GlobalReAlloc
MultiByteToWideChar
ReleaseMutex
WaitForSingleObject
GetCommandLineW
LoadResource
FindResourceA
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
UnhandledExceptionFilter
WideCharToMultiByte
CompareStringW
CompareStringA
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetEnvironmentVariableA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetLocaleInfoW
GetLocaleInfoA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThread
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
FatalAppExitA
IsDebuggerPresent
SetConsoleCtrlHandler
InterlockedExchange
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
RtlUnwind
HeapSize
ole32
CreateFileMoniker
StringFromCLSID
oleaut32
VarUI2FromUI1
rpcrt4
NdrByteCountPointerMarshall
user32
IMPGetIMEA
CharUpperBuffW
wsprintfA
OemKeyScan
DrawAnimatedRects
GetDlgItemTextW
CharLowerBuffA
Exports
Exports
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ