Static task
static1
Behavioral task
behavioral1
Sample
5df55d928563394c27765620356fbf2e_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5df55d928563394c27765620356fbf2e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5df55d928563394c27765620356fbf2e_JaffaCakes118
-
Size
180KB
-
MD5
5df55d928563394c27765620356fbf2e
-
SHA1
bc9fc0f16598f8a2ffcf982b1955fb612a3778ce
-
SHA256
7276ec684d3be8826edd73171326e6f870338df56da8d3949c8eecfa08d6f9ca
-
SHA512
05abc1a1376da55907d87dafd0d151aeca39510f15ab3c38cbfa9a93b4f6b8fb45a0717e7b0b2532a9f13b99716207282eae0f433198949a4db39731377991e5
-
SSDEEP
3072:i3nKsTUcoNYbUY8+jjGbIAq2tn2TBfki43y97FozS4Oq1sqH73oGY:kvzbu+jjGlqun2TB8i4i0zLOosqHkG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5df55d928563394c27765620356fbf2e_JaffaCakes118
Files
-
5df55d928563394c27765620356fbf2e_JaffaCakes118.dll windows:4 windows x86 arch:x86
d66c0f732f8f177c9219851dadfd9da7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
htonl
kernel32
GetModuleFileNameA
FindClose
FindFirstFileA
GetVolumeInformationA
WaitForSingleObject
CreateMutexA
OpenMutexA
ReadFile
FindNextFileA
FreeLibrary
GetTempPathA
GetSystemDirectoryA
GetSystemTime
lstrlenA
lstrcpynA
GetComputerNameA
OpenProcess
LoadLibraryA
GetCurrentProcessId
LocalFree
LocalAlloc
GetCurrentProcess
GetCurrentThread
CreateMutexW
SetLastError
lstrcpyA
GetVersion
lstrcatA
VirtualFree
ReleaseMutex
VirtualAlloc
OpenMutexW
GetModuleHandleA
LoadLibraryExA
IsBadReadPtr
CreateFileW
GetEnvironmentVariableW
LoadLibraryW
MapViewOfFile
GetProcAddress
GetFileSize
SetFilePointer
CreateThread
Sleep
CreateFileA
WriteFile
CloseHandle
GetFileTime
SetFileTime
CreateProcessA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
FindResourceA
LoadResource
SizeofResource
LockResource
DeleteFileA
MoveFileExA
GetLastError
CopyFileA
SetFileAttributesA
GetEnvironmentVariableA
GetVersionExA
CreateFileMappingA
user32
UnregisterClassA
SetPropA
CreateWindowExW
DestroyWindow
wsprintfA
UnregisterClassW
advapi32
RegDeleteValueA
RegEnumValueA
LookupAccountNameA
RegEnumKeyExA
LookupAccountSidA
IsValidSid
AccessCheck
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetUserNameW
LookupAccountSidW
AllocateAndInitializeSid
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
DuplicateTokenEx
OpenThreadToken
GetSidIdentifierAuthority
SetSecurityDescriptorDacl
msvcrt
_mbschr
_local_unwind2
strcmp
wcsncat
wcscpy
strncmp
_wcsicmp
_adjust_fdiv
_itoa
_stricmp
sscanf
strcat
memset
strstr
strncpy
memcpy
strlen
malloc
strcpy
free
strncat
memcmp
_snprintf
_ftol
realloc
_abnormal_termination
wcscmp
wcslen
??3@YAXPAX@Z
??2@YAPAXI@Z
_initterm
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ