Static task
static1
Behavioral task
behavioral1
Sample
5c8caa6a282607572d956fd12c0b7759_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5c8caa6a282607572d956fd12c0b7759_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5c8caa6a282607572d956fd12c0b7759_JaffaCakes118
-
Size
136KB
-
MD5
5c8caa6a282607572d956fd12c0b7759
-
SHA1
04f418da60193260afe23e87208ece3a87d059db
-
SHA256
8f2a8b779eadb9cb15a0260e0c38946bcee3da4f620e1ba16038fadb5db93475
-
SHA512
4c3cd2fc888a6979a2be861d479245fceb6bb7d5bb4959474b3e81914e450ad31cadb20ed75b6ebe2287d793de0b944d713b10bfcb175909a8c932516c42a2cb
-
SSDEEP
3072:0Xhwt++m8oCpsfTNI0bmY4/RNt+K5WoXeIp:4j8JsfTpH45NtH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c8caa6a282607572d956fd12c0b7759_JaffaCakes118
Files
-
5c8caa6a282607572d956fd12c0b7759_JaffaCakes118.dll windows:4 windows x86 arch:x86
4e599c2f3e7ab19dc90816c0a5a218de
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
IsBadReadPtr
FlushInstructionCache
GetCurrentThread
VirtualProtect
FreeLibrary
GetCurrentThreadId
GetProcessVersion
InitializeCriticalSection
CloseHandle
WaitForSingleObject
SetThreadPriority
DeleteFileA
GetThreadPriorityBoost
GetFileSize
GetFileType
FindFirstFileA
GetComputerNameA
GetLastError
GetTempFileNameA
GetModuleFileNameA
GetThreadPriority
LeaveCriticalSection
EnterCriticalSection
SetLastError
DeleteCriticalSection
GetExitCodeProcess
OpenProcess
ResetEvent
SetEvent
WaitForMultipleObjects
CreateEventA
GetExitCodeThread
HeapFree
GetProcessHeap
CreateThread
GetModuleHandleA
FindClose
FindNextFileA
MultiByteToWideChar
lstrlenA
GetFileTime
CreateFileA
HeapReAlloc
HeapValidate
IsBadWritePtr
lstrlenW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
TerminateProcess
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
LoadLibraryA
GetProcAddress
HeapAlloc
GetCurrentProcess
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
Sleep
FlushFileBuffers
InterlockedDecrement
InterlockedIncrement
RaiseException
MoveFileA
GetCommandLineA
GetVersion
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetStartupInfoA
SetFilePointer
ReadFile
WriteFile
WideCharToMultiByte
ExitProcess
SetStdHandle
user32
FindWindowA
DestroyWindow
SendMessageA
GetKeyboardLayout
MapVirtualKeyExA
TranslateMessage
DispatchMessageA
SetRect
GetWindowThreadProcessId
SetLastErrorEx
GetMessageA
SetActiveWindow
GetDC
SetTimer
SetWindowLongA
SetParent
GetWindowRect
GetWindowDC
GetClientRect
SetCursorPos
SetForegroundWindow
ScreenToClient
SetFocus
IsRectEmpty
GetForegroundWindow
gdi32
SetRectRgn
advapi32
RevertToSelf
oleaut32
SysAllocStringLen
SysFreeString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SYNC Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ