Static task
static1
Behavioral task
behavioral1
Sample
5b39fb53e35924b41b6055c0d2b1fcac_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b39fb53e35924b41b6055c0d2b1fcac_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5b39fb53e35924b41b6055c0d2b1fcac_JaffaCakes118
-
Size
324KB
-
MD5
5b39fb53e35924b41b6055c0d2b1fcac
-
SHA1
ccbc4b4531b1ca0213b5bdb4dcd88093555b64d0
-
SHA256
76f092affcb61beab19c8e66ca755ba06b7659bb08fe21fc718b41e8e2524f80
-
SHA512
82676f52f660299e57095a8c6b0348b0460c3214ee1aab7931646982c1f7156ee16d7f42d79eaa77a0b5d95bc73a4ca09345aad601c11effd6bf998af89f32c1
-
SSDEEP
3072:FGv/fa4qToVD1Q7vUqEi94lqwx+AbHY0pTism6yxfeXdoIh9std35l8Pq:FGlnb91mnEVs8Pq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b39fb53e35924b41b6055c0d2b1fcac_JaffaCakes118
Files
-
5b39fb53e35924b41b6055c0d2b1fcac_JaffaCakes118.dll windows:4 windows x86 arch:x86
15a3ac8c74d8045645760a4cb4a2a603
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WaitForSingleObject
GetTempFileNameW
GetWindowsDirectoryW
FindClose
FindFirstFileW
CopyFileW
GetProcAddress
LoadLibraryW
CreateProcessW
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetTempPathW
SetFilePointer
Sleep
GetFileAttributesW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
CreateDirectoryW
SetFileTime
CreateFileA
SetEndOfFile
GetLocaleInfoA
GetTickCount
GetModuleFileNameW
CreateFileW
WriteFile
CloseHandle
lstrcpynW
SystemTimeToFileTime
GetSystemTime
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
InitializeCriticalSection
LoadLibraryA
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
RtlUnwind
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetModuleFileNameA
QueryPerformanceCounter
user32
GetWindowTextW
EnumWindows
GetWindow
IsWindowVisible
GetDesktopWindow
SetForegroundWindow
MessageBoxW
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
shell32
ShellExecuteW
ole32
StringFromGUID2
CoCreateGuid
CoCreateInstance
CoInitializeEx
CoUninitialize
CoInitialize
shlwapi
SHDeleteKeyW
wininet
HttpOpenRequestW
HttpAddRequestHeadersW
InternetAttemptConnect
InternetConnectW
InternetOpenW
InternetReadFile
HttpQueryInfoW
InternetCloseHandle
HttpSendRequestW
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ