Static task
static1
Behavioral task
behavioral1
Sample
5dfc7769b1d9d6ce76b909cc3d973168_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5dfc7769b1d9d6ce76b909cc3d973168_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5dfc7769b1d9d6ce76b909cc3d973168_JaffaCakes118
-
Size
6KB
-
MD5
5dfc7769b1d9d6ce76b909cc3d973168
-
SHA1
8db2a606ad695d8416404adbb5153ea12b9506ef
-
SHA256
e2c014dd120b14391dd0588602b5ffad2593abf448cacf55fbff1cc9f9435236
-
SHA512
961af076a37b5166e9598efae198d5147ae8b964be4358b0eac83c7ddb25a6cf6c0ba5dcab7641e585dcdec8509d382b7938946f31f4d9584dc5d0f639a50f96
-
SSDEEP
192:pTaRJaDdqtIg+8tJKUkoP6quLpFj7htH:lgJk4toa5R67LLNV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dfc7769b1d9d6ce76b909cc3d973168_JaffaCakes118
Files
-
5dfc7769b1d9d6ce76b909cc3d973168_JaffaCakes118.dll windows:4 windows x86 arch:x86
ed99cf885ff3578684bd6cad12b72a72
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CompareStringA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleA
OpenProcess
GetCurrentProcess
HeapAlloc
GetProcessHeap
VirtualProtect
IsBadReadPtr
CreateThread
lstrlenA
WideCharToMultiByte
Sleep
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameA
user32
wsprintfA
GetWindowThreadProcessId
FindWindowA
SetTimer
KillTimer
TranslateMessage
DispatchMessageA
GetMessageA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
msvcrt
strrchr
_except_handler3
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 438B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ