SK
Static task
static1
Behavioral task
behavioral1
Sample
5c66f61ffe24a04df7688d1c84575b28_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5c66f61ffe24a04df7688d1c84575b28_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5c66f61ffe24a04df7688d1c84575b28_JaffaCakes118
-
Size
24KB
-
MD5
5c66f61ffe24a04df7688d1c84575b28
-
SHA1
a7c459147bc87b48bc7e347e6de16a16222e623e
-
SHA256
2ebe9f43c04058bec40934928b7d5ce728fe4507c4e311028a5d85cd99d0a1e2
-
SHA512
544a41eed43d62a2d5e050a2e9b45c4bcbd66b40d1a7e96ea451dc957ddfc7c40b2cb3a68588067fd9051c0fba9af7704a53ed32a099347acf7dc5cb668b9412
-
SSDEEP
96:TxfMpcwgKnz3LM7IIBje9TjO09VrlwtAlVf1fIxMp5eci:TxZZxyjsA7f1f3i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c66f61ffe24a04df7688d1c84575b28_JaffaCakes118
Files
-
5c66f61ffe24a04df7688d1c84575b28_JaffaCakes118.dll windows:4 windows x86 arch:x86
86442b2f52ed58be06ac551b2b117b54
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetCurrentProcess
GetProcAddress
LoadLibraryA
lstrcatA
GetCurrentProcessId
GetLocalTime
lstrcpyA
GetCurrentThreadId
user32
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
SetWindowsHookExA
CallNextHookEx
ToAscii
GetActiveWindow
wsprintfA
GetWindowTextA
GetKeyboardState
msvcrt
_adjust_fdiv
malloc
_initterm
free
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 930B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Share Size: 4KB - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ