pwt
Static task
static1
Behavioral task
behavioral1
Sample
59c0e76381dca1b42a4337dca421e44e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59c0e76381dca1b42a4337dca421e44e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
59c0e76381dca1b42a4337dca421e44e_JaffaCakes118
-
Size
48KB
-
MD5
59c0e76381dca1b42a4337dca421e44e
-
SHA1
b21bb63b116ba3d8962625bf36cb8c80db5557a4
-
SHA256
4da03ae76c811fc8b2df0dc39159eb4ffa8088e6f6237da20ff3370b6b5ec895
-
SHA512
3407911889c4325e6884627d22f65f6ce7da18141f49f8c83662c51fcc60cf57fcf1c15061511bae2b10953f1ffdadc1fbce0d2f45d15f579354b71547da90dd
-
SSDEEP
768:DmFiXTuOWRYXl9tZ1hRpB1hRpZxh2OmCaKqayK2qWrL7cZXzw/6cG5T9JIcmZZvN:qdVL7sD46cGl8fHCl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59c0e76381dca1b42a4337dca421e44e_JaffaCakes118
Files
-
59c0e76381dca1b42a4337dca421e44e_JaffaCakes118.dll windows:4 windows x86 arch:x86
8ac9aec9691b76240998ba4178dfa122
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrlenA
Sleep
GetTickCount
GetFileAttributesA
CloseHandle
GetFileSize
CreateFileA
ReadFile
FindNextFileA
lstrcpyA
FindClose
FindFirstFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetProcAddress
LoadLibraryA
GetCurrentProcess
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
VirtualQuery
InterlockedExchange
RtlUnwind
UnhandledExceptionFilter
GetEnvironmentStringsW
GetLastError
ExitProcess
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleA
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetSystemInfo
user32
GetDesktopWindow
GetCursorPos
EnumWindows
GetWindowThreadProcessId
PostMessageA
DestroyWindow
EnableWindow
GetWindowRect
EnumChildWindows
IsWindowVisible
GetClassNameA
IsWindowEnabled
GetWindowTextA
wsprintfA
SendInput
ShowWindow
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ