Static task
static1
Behavioral task
behavioral1
Sample
5a0e55a211f17316858e1130d65817f6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a0e55a211f17316858e1130d65817f6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5a0e55a211f17316858e1130d65817f6_JaffaCakes118
-
Size
22KB
-
MD5
5a0e55a211f17316858e1130d65817f6
-
SHA1
a14275ca2b2181f668e78658200a385961afc172
-
SHA256
6af648c90b5fa8a09492da8d4e473117046d9aed5404d6124948783b0d117a17
-
SHA512
e63f2cc00ebecad4c7b94a34ca6adfa41a95f638fd08bcc4e11bdcab6e489645135d292df7ea13fccc15527a5de6694098d79ab5cbb5d005481a3b86022bd379
-
SSDEEP
384:8UNFOyeCalauKV0rbwbK8wtEUHRL1hb9rjVA6QlSOl+QfdyYEnDlbG+P26sR4o0b:/Ngb8EbsLwtEUHRL1vlA6elcVnDpZe4p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a0e55a211f17316858e1130d65817f6_JaffaCakes118
Files
-
5a0e55a211f17316858e1130d65817f6_JaffaCakes118.dll windows:4 windows x86 arch:x86
f03ba74f1817ee8f550b1b1b16fce725
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateToolhelp32Snapshot
GetModuleFileNameA
VirtualProtectEx
GetCurrentThreadId
GetCurrentProcess
GlobalFree
GlobalUnlock
IsBadReadPtr
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
Process32First
ReadProcessMemory
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
WriteProcessMemory
Process32Next
CloseHandle
TerminateThread
Sleep
CreateThread
GlobalAlloc
GlobalLock
LoadLibraryA
GetProcAddress
GetCurrentThread
GetCurrentProcessId
CreateMutexA
GetModuleHandleA
GetLastError
user32
GetWindowThreadProcessId
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
memset
wcslen
strcmp
fopen
memcpy
strcat
sprintf
strcpy
??2@YAPAXI@Z
strrchr
strstr
strlen
??3@YAXPAX@Z
sscanf
strncpy
fclose
fread
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ