WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
5fffd67a7436460d2e6c843ada88b1cd_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5fffd67a7436460d2e6c843ada88b1cd_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5fffd67a7436460d2e6c843ada88b1cd_JaffaCakes118
-
Size
54KB
-
MD5
5fffd67a7436460d2e6c843ada88b1cd
-
SHA1
6eb64e7351beb04af3bf7989115c489d2fc8bd54
-
SHA256
4480c9dbc73c2d7fd73a892508bc6adfa4aa7b1e7d3114db621ff71fa393a0dd
-
SHA512
6babfb45c30f9f0401752a8b352a18ea0d44a06e645d8114e54e18dc6800d57159941b8683da843ddf95811aa40dda97925235a2ab8693d80bedc63cdbf7636e
-
SSDEEP
1536:1K1DAM0EeatKlhbMpYPBplmFtBLR5nbTM/H2:1KJAOeatKlhb6eBplqt79bA/W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5fffd67a7436460d2e6c843ada88b1cd_JaffaCakes118
Files
-
5fffd67a7436460d2e6c843ada88b1cd_JaffaCakes118.dll windows:4 windows x86 arch:x86
d12a850dc6940aeb06be9bd608320069
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetFileAttributesA
CreateFileA
GetDriveTypeA
GetLogicalDriveStringsA
GetTickCount
FindClose
FindFirstFileA
SetFilePointer
DeleteFileW
FindNextFileW
FileTimeToSystemTime
CreateFileW
FindFirstFileW
GetTempPathW
DeleteFileA
FindNextFileA
GetTempPathA
GetVersionExA
LoadLibraryA
GetFileTime
lstrlenA
TerminateThread
ReleaseMutex
GetModuleFileNameA
DeviceIoControl
OpenMutexA
MoveFileExA
MoveFileA
CopyFileA
GetSystemDirectoryA
GetLastError
FreeLibrary
SetFileTime
GetComputerNameA
CreateMutexA
SetCurrentDirectoryA
FlushFileBuffers
SetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
ExpandEnvironmentStringsA
WriteFile
lstrcpyA
CreatePipe
CreateProcessA
CreateThread
WaitForSingleObject
ReadFile
PeekNamedPipe
GetCurrentProcess
TerminateProcess
Sleep
OpenProcess
CloseHandle
GetProcAddress
user32
DestroyWindow
IsWindow
SendMessageA
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupAccountSidA
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
IsValidSid
RegOpenKeyExA
shell32
ShellExecuteA
StrStrIA
ws2_32
socket
inet_ntoa
inet_addr
closesocket
gethostbyname
htons
sendto
recvfrom
setsockopt
recv
WSAIoctl
bind
gethostname
ntohs
send
connect
WSAStartup
msvfw32
MCIWndCreateA
avicap32
capCreateCaptureWindowA
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
msvcrt
_strlwr
_itoa
_strnicmp
_adjust_fdiv
malloc
_initterm
free
memchr
strrchr
strncmp
fopen
fseek
fread
fclose
rename
swprintf
wcslen
strstr
time
srand
rand
??2@YAPAXI@Z
atoi
_except_handler3
sprintf
??3@YAXPAX@Z
__CxxFrameHandler
shlwapi
SHGetValueA
SHSetValueA
Exports
Exports
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inidata Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ