Behavioral task
behavioral1
Sample
5fa0e4db04db1fada5c61cc74259c53a_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5fa0e4db04db1fada5c61cc74259c53a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5fa0e4db04db1fada5c61cc74259c53a_JaffaCakes118
-
Size
137KB
-
MD5
5fa0e4db04db1fada5c61cc74259c53a
-
SHA1
9ab83d6cdd3a9eb699acf7d0db93e4b8fb21180d
-
SHA256
cf1b97465e67b3e62514150371a810e05950de3e1d4adf69bd8d3b030d1f8bd8
-
SHA512
f91aa6d043700491e259d2c45233bc1bc7702b70ae5a1df0c54f99bab56f7b3bfa6315932efdd5a5c642d6ba04e898e13de522db50ffd067ff2d90e5da7ba229
-
SSDEEP
3072:6niXS4Rz+mbvUif3yRauPxshFUf8W9tr:TnYLiuauPxsRYt
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5fa0e4db04db1fada5c61cc74259c53a_JaffaCakes118
Files
-
5fa0e4db04db1fada5c61cc74259c53a_JaffaCakes118.dll windows:5 windows x86 arch:x86
1499515fd9a07390b678983d81c98d58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
wcscmp
malloc
free
strlen
atoi
strstr
wcsrchr
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
memset
memcpy
_except_handler3
shlwapi
SHGetValueA
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
PathFileExistsA
ws2_32
WSAGetLastError
WSARecvFrom
bind
WSACreateEvent
WSAResetEvent
gethostname
inet_addr
WSAEventSelect
shutdown
gethostbyname
connect
WSAStartup
htonl
htons
setsockopt
sendto
WSACleanup
socket
closesocket
send
inet_ntoa
iphlpapi
GetAdaptersInfo
wintrust
WinVerifyTrust
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCancelConnection2A
WNetCloseEnum
WNetAddConnection2A
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
gdiplus
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
kernel32
FindClose
FindFirstFileA
FindNextFileA
SetFileAttributesA
FlushViewOfFile
WaitForMultipleObjects
GetLogicalDriveStringsA
lstrcpynA
GetExitCodeThread
RemoveDirectoryA
CreateFileMappingA
UnmapViewOfFile
MapViewOfFile
CreateThread
lstrcpyW
VirtualProtect
CopyFileA
TransactNamedPipe
GlobalAlloc
GlobalFree
GetLocalTime
GetDriveTypeA
CreateDirectoryA
GetFileAttributesA
GetLogicalDrives
MoveFileExA
ExitProcess
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
VirtualQuery
SetEndOfFile
FreeLibrary
WaitForSingleObject
SetEvent
GetModuleHandleW
VirtualFree
WriteFile
Sleep
CreateEventA
ReadFile
GetSystemDirectoryA
ExitThread
MultiByteToWideChar
lstrcmpiA
GetProcAddress
VirtualAlloc
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetTempPathA
DeleteFileA
lstrcpyA
FindResourceA
FreeResource
LoadResource
Process32First
GetTickCount
GetSystemTimeAsFileTime
SetFileTime
lstrcmpiW
SizeofResource
GetExitCodeProcess
CreateProcessA
lstrcatA
GetLastError
Process32Next
LockResource
DeviceIoControl
SetNamedPipeHandleState
LoadLibraryExA
CreateToolhelp32Snapshot
GetFileTime
GetVersionExA
LocalFree
WideCharToMultiByte
ConnectNamedPipe
TerminateThread
Thread32Next
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
OpenThread
GetCurrentThreadId
GetCurrentProcess
OpenProcess
GetVolumeInformationA
TerminateProcess
lstrlenW
WinExec
user32
ReleaseDC
GetDC
wsprintfW
wsprintfA
PostMessageA
FindWindowA
gdi32
BitBlt
DeleteDC
CreateCompatibleBitmap
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
advapi32
SetEntriesInAclA
OpenSCManagerA
ControlService
RegOpenKeyA
RegCloseKey
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
CloseServiceHandle
OpenServiceW
RegSetValueExA
RegQueryValueExA
CreateServiceA
StartServiceA
RegCreateKeyExA
RegOpenKeyExA
DuplicateTokenEx
CreateProcessAsUserA
AdjustTokenPrivileges
RegFlushKey
RegSaveKeyA
LookupPrivilegeValueA
RegRestoreKeyA
DeleteService
OpenProcessToken
OpenServiceA
QueryServiceStatus
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE