Static task
static1
Behavioral task
behavioral1
Sample
59aab557fd923aeb08429d9ec9a598e6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59aab557fd923aeb08429d9ec9a598e6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
59aab557fd923aeb08429d9ec9a598e6_JaffaCakes118
-
Size
24KB
-
MD5
59aab557fd923aeb08429d9ec9a598e6
-
SHA1
dc3120a70d631e7662867f5578eee273b2f11c07
-
SHA256
e72fd3cbe8cb270478ab36ca364882610c916b7084e55253784a16df03547a07
-
SHA512
d19adbc99b33310e98167828433322cfce92cdeb1b06fb03100e3f30a55c1a181f42f187a53154a9f49d13c0347792953c2723b6ed9acb20cdce4d5298b18b86
-
SSDEEP
192:WCr5TIxbX5KpxA3YQxVtWQMP5OMcyJLewspct5U9lk:99UxbpKHWVtBM7Lewspct5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59aab557fd923aeb08429d9ec9a598e6_JaffaCakes118
Files
-
59aab557fd923aeb08429d9ec9a598e6_JaffaCakes118.dll windows:4 windows x86 arch:x86
ab4410bf31c1e89eb7351a7ae5eebfc4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
GetKeyboardState
MapVirtualKeyA
ToAscii
msvcrt
_adjust_fdiv
_itoa
malloc
_initterm
free
strchr
strcmp
atoi
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
fopen
fwrite
fclose
fread
time
memset
_strlwr
kernel32
GetModuleHandleA
CreateThread
TerminateProcess
lstrlenA
LoadLibraryA
CopyFileA
GetProcAddress
GetModuleFileNameA
GetTempPathA
Sleep
EnterCriticalSection
lstrcmpA
lstrcpyA
LeaveCriticalSection
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
InitializeCriticalSection
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ