Static task
static1
Behavioral task
behavioral1
Sample
5cc225fc37787f7d2b9f6ff2eb8598c4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5cc225fc37787f7d2b9f6ff2eb8598c4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5cc225fc37787f7d2b9f6ff2eb8598c4_JaffaCakes118
-
Size
27KB
-
MD5
5cc225fc37787f7d2b9f6ff2eb8598c4
-
SHA1
b330369f7719168b74a8310b3acf82e581d3546e
-
SHA256
a6b404cce176019022c9122b7135618cb761b876d136e8fca50e354365328757
-
SHA512
bea77caeebc27b306a45b64b390463421d5fa07de1363803eea7cda144dcbdbe00d91c03cf25a81e1dc493a6892eaa6620f48052856182ead7778e1865aa8b38
-
SSDEEP
768:b6doDxccUYNjqsraiYERsYR1DGdPwGJ8whhZcI:DDxccUQqe7w4GVw92hZc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cc225fc37787f7d2b9f6ff2eb8598c4_JaffaCakes118
Files
-
5cc225fc37787f7d2b9f6ff2eb8598c4_JaffaCakes118.dll windows:4 windows x86 arch:x86
264fcb89918add98d59d40256a57d485
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtectEx
TerminateProcess
TerminateThread
IsBadReadPtr
GetPrivateProfileStringA
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadProcessMemory
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
GetCurrentThread
Process32Next
InitializeCriticalSection
CreateToolhelp32Snapshot
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
Sleep
CreateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
EnterCriticalSection
LeaveCriticalSection
LoadLibraryA
GetProcAddress
GetCurrentProcessId
CreateMutexA
Process32First
GetLastError
user32
GetWindowTextA
GetForegroundWindow
FindWindowA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
ws2_32
WSASetLastError
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
msvcrt
sscanf
_strlwr
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
strrchr
wcslen
strcmp
fopen
strcat
sprintf
strcpy
memcpy
atoi
strchr
memset
??2@YAPAXI@Z
strncpy
??3@YAXPAX@Z
_strnicmp
strlen
strstr
fclose
fread
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ