Static task
static1
Behavioral task
behavioral1
Sample
5cfc471f2c144d772f79d5c8282dcf52_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5cfc471f2c144d772f79d5c8282dcf52_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5cfc471f2c144d772f79d5c8282dcf52_JaffaCakes118
-
Size
168KB
-
MD5
5cfc471f2c144d772f79d5c8282dcf52
-
SHA1
d4ceb90a7acea9bfc476f08c6ef400f835379c96
-
SHA256
5bbed5bebef1b3fdc0856d2bd1e94fd7f89fee3bddf56ea95af63a74dc793572
-
SHA512
c94db3cc9c9f3556031aaa4d9ccd07a3b382e8bdd896ddf0fb00ee53aedda451ebddf471fd7cdb84020bfe6880ccc53c90207b748043a67774fa94fe32d6126f
-
SSDEEP
3072:lEyMQMc1y+8oGxeWqLIufvp2qZwteI92AYcrvtU3efxvj74Fg1vhXuDHbbEj0mNV:kQMtN5xdIL53Zwt2PEvuqh7jvhXuD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cfc471f2c144d772f79d5c8282dcf52_JaffaCakes118
Files
-
5cfc471f2c144d772f79d5c8282dcf52_JaffaCakes118.dll windows:4 windows x86 arch:x86
fa86595294e370d45283d3b19895babc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemTime
FreeLibrary
GetProcAddress
CompareFileTime
GetDriveTypeW
CreateMutexW
DeleteCriticalSection
GetModuleFileNameW
GetVolumePathNameW
CreateDirectoryW
SetLastError
RaiseException
EnterCriticalSection
OpenFileMappingW
DuplicateHandle
CompareStringW
LoadLibraryA
LeaveCriticalSection
ExpandEnvironmentStringsW
CreateProcessW
LoadLibraryExW
lstrlenW
LoadResource
SizeofResource
lstrlenA
lstrcpynW
lstrcatW
InitializeCriticalSection
InterlockedDecrement
lstrcpyW
SetFilePointer
TlsSetValue
GetTickCount
IsBadWritePtr
WideCharToMultiByte
MultiByteToWideChar
GetACP
lstrcmpiA
LoadLibraryW
lstrcmpA
lstrcmpW
DeleteFileA
DeleteFileW
ReadFile
TlsGetValue
lstrcpynA
GetProfileIntW
CloseHandle
GetFileAttributesW
LocalAlloc
LocalFree
InterlockedIncrement
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileW
HeapFree
GetProcessHeap
HeapAlloc
GetWindowsDirectoryW
GetCommandLineA
GlobalFree
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
InterlockedExchange
GetCommandLineW
Sleep
GlobalUnlock
lstrcmpiW
VirtualProtect
FindResourceW
GlobalAlloc
user32
GetMenu
GetCursorPos
InvalidateRect
CheckMenuRadioItem
IsWindowVisible
MoveWindow
BeginDeferWindowPos
EndDeferWindowPos
CheckRadioButton
SetFocus
UpdateWindow
GetWindowRect
GetDC
ReleaseDC
ShowWindow
GetParent
EnumChildWindows
EnableWindow
GetDlgItem
CharLowerW
PostMessageW
PostMessageA
SetWindowTextW
SetWindowTextA
SystemParametersInfoW
SystemParametersInfoA
SendDlgItemMessageW
SendDlgItemMessageA
SendMessageW
SendMessageA
LoadStringA
GetSysColor
CheckMenuItem
GetActiveWindow
MessageBoxW
GetSystemMetrics
LoadStringW
BeginPaint
EndPaint
SetScrollInfo
DefWindowProcW
FillRect
SetRect
SetWindowPos
GetClientRect
GetWindowLongW
TranslateMessage
IsWindow
GetPropW
DestroyWindow
RemovePropW
PostQuitMessage
SetPropW
SetTimer
CharNextW
CharPrevW
SetWindowLongW
DispatchMessageW
advapi32
RegQueryValueExW
RegEnumValueA
RegQueryValueExA
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegisterEventSourceA
DeregisterEventSource
ReportEventW
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
SetTokenInformation
InitializeSid
GetSidLengthRequired
CreateRestrictedToken
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
gdi32
GetFontResourceInfoW
AddFontResourceW
RemoveFontResourceW
CreateCompatibleDC
DeleteObject
SelectObject
DeleteDC
ole32
StringFromCLSID
CoGetMalloc
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
ReleaseStgMedium
PropVariantClear
CoTaskMemFree
msvcr71
_onexit
memmove
_vsnwprintf
memset
_amsg_exit
free
_XcptFilter
_wcsnicmp
wcschr
_adjust_fdiv
_initterm
strncat
memcpy
_wcslwr
realloc
malloc
wcslen
wcsncpy
__CppXcptFilter
__dllonexit
_except_handler3
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ