winnetpnp
Static task
static1
Behavioral task
behavioral1
Sample
5f708f6fdad3ea74107f8f5ce474dd37_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f708f6fdad3ea74107f8f5ce474dd37_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5f708f6fdad3ea74107f8f5ce474dd37_JaffaCakes118
-
Size
140KB
-
MD5
5f708f6fdad3ea74107f8f5ce474dd37
-
SHA1
3d3cf2a016c1e691b4a1905413b5fcb79052844e
-
SHA256
4d6bed5710fe0f2f93186409f43a4d53b43ea4aa9a15f26e56f6b10441d0444e
-
SHA512
b9d600b8e7423e9a2413eb2269df50fb0a0bef478780f388d43e0235f8e947dc2343a59c035d202c6a3f822e406581dc9fe9290b7740c122900ba04faabd2a7b
-
SSDEEP
3072:1z8HDimFreWrdc76kNCWS/jp93iT7TzraPVEnDFUjKv:1gHHreWxc7WWujp9up5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f708f6fdad3ea74107f8f5ce474dd37_JaffaCakes118
Files
-
5f708f6fdad3ea74107f8f5ce474dd37_JaffaCakes118.dll windows:4 windows x86 arch:x86
3248e7823183b46d4532ebde9c16cd78
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateProcessA
HeapFree
CreateFileMappingA
GlobalFree
ReadProcessMemory
WriteProcessMemory
ExitProcess
MapViewOfFile
GlobalAlloc
SetLastError
WaitForSingleObject
InterlockedCompareExchange
GetLastError
CreateDirectoryA
CreateFileA
WriteFile
GetProcessHeap
OpenEventA
LocalFree
CreateMutexW
GetVolumeInformationA
GetModuleFileNameA
HeapAlloc
CloseHandle
UnmapViewOfFile
Sleep
GetCommandLineA
TerminateProcess
GetCurrentProcess
GetTickCount
GetComputerNameA
OpenFileMappingA
GetModuleHandleA
CreateEventA
LeaveCriticalSection
LoadLibraryA
CopyFileA
GetProcAddress
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
ole32
CoTaskMemAlloc
CoSetProxyBlanket
CoCreateGuid
OleCreate
CoCreateInstance
CoInitialize
OleSetContainedObject
CoUninitialize
user32
PostQuitMessage
TranslateMessage
DispatchMessageA
GetWindow
DefWindowProcA
SetWindowLongA
FindWindowA
UnhookWindowsHookEx
SetTimer
SetWindowsHookExA
RegisterWindowMessageA
ClientToScreen
GetWindowThreadProcessId
SendMessageA
GetMessageA
GetClassNameA
GetParent
CreateWindowExA
GetCursorPos
GetWindowLongA
GetSystemMetrics
PeekMessageA
ScreenToClient
KillTimer
DestroyWindow
oleaut32
SysAllocStringLen
SysStringLen
SysAllocString
SysFreeString
shlwapi
UrlUnescapeW
StrStrIW
advapi32
GetUserNameA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
OpenProcessToken
DuplicateTokenEx
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
SetTokenInformation
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ