Static task
static1
Behavioral task
behavioral1
Sample
5bdf5f311656a693971ebc5a53e2f026_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5bdf5f311656a693971ebc5a53e2f026_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5bdf5f311656a693971ebc5a53e2f026_JaffaCakes118
-
Size
125KB
-
MD5
5bdf5f311656a693971ebc5a53e2f026
-
SHA1
655c1e22b18f83fafc78af17e6527ab9a22b35f5
-
SHA256
d8a67834a596a4a44466959cc9b00ace228bc9ac389fcebfcabe256392d8441c
-
SHA512
bff272f419855e700e1bbd7535f11266fa398612d30527bebe6bb0a35760d1f72fd473878c2515520b09bbbd7c8738132a8276adad1042278dc841fe1367c002
-
SSDEEP
3072:OyTX3jpQFvNXEEfsaGgTHmc9tk+bTkRvcdhohJXDNEYZ3knqMq:OqQdNXEEfa0GN+Iv2hu5nZgfq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bdf5f311656a693971ebc5a53e2f026_JaffaCakes118
Files
-
5bdf5f311656a693971ebc5a53e2f026_JaffaCakes118.dll windows:4 windows x86 arch:x86
e7b60b434abf847f073a5172df160546
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateThread
ExitThread
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleHandleA
GetOEMCP
GetPriorityClass
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
IsBadCodePtr
IsBadReadPtr
IsBadStringPtrA
IsBadWritePtr
LCMapStringA
LCMapStringW
LoadLibraryA
LocalAlloc
MultiByteToWideChar
OpenProcess
OutputDebugStringA
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetFileAttributesA
SetHandleCount
SetPriorityClass
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WideCharToMultiByte
WriteFile
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
user32
AppendMenuA
CallWindowProcA
CharLowerBuffA
CharUpperA
CheckDlgButton
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateDialogParamA
CreatePopupMenu
DefDlgProcA
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EnumClipboardFormats
FindWindowA
GetActiveWindow
GetClassInfoA
GetClientRect
GetClipboardData
GetCursorPos
GetDlgItem
GetDlgItemTextA
GetMenu
GetMessageA
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
InsertMenuItemA
InvalidateRect
IsDialogMessageA
IsDlgButtonChecked
IsMenu
IsWindow
KillTimer
LoadAcceleratorsA
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
OpenClipboard
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClassA
RemoveMenu
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetClipboardData
SetCursor
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetMenuItemInfoA
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowTextA
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
UnregisterClassA
wsprintfA
wvsprintfA
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 108KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ