Static task
static1
Behavioral task
behavioral1
Sample
6147e6f664e8b7916fffea5258635221_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6147e6f664e8b7916fffea5258635221_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6147e6f664e8b7916fffea5258635221_JaffaCakes118
-
Size
69KB
-
MD5
6147e6f664e8b7916fffea5258635221
-
SHA1
09b051176a6730733453b174c42cb1ff4a3acae9
-
SHA256
42c904053085d1745a334cab7fec642292ac53871171afd5566b95925e0077a3
-
SHA512
f7c25a3d8c7514d60fb82ac3877167cbf99bb1930623000214287de1d6c9e647b26997b7c80869d8bbb718a88a075a2ec4498efe0c5ef0edf68c0c3d94382ee9
-
SSDEEP
1536:ZGoZUDXQ4nqbxmaiOMbJSPByu0PB60oWAR/XHPisR0dfXwd:ooZYXZnqbxm3OyJS1ABdE3asRCQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6147e6f664e8b7916fffea5258635221_JaffaCakes118
Files
-
6147e6f664e8b7916fffea5258635221_JaffaCakes118.dll windows:4 windows x86 arch:x86
2facc447db58db980427034ff1982e20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
EnumResourceLanguagesA
ExitProcess
FlushFileBuffers
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetStartupInfoA
HeapAlloc
LeaveCriticalSection
LoadResource
OpenFile
SetCurrentDirectoryA
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ntdll
NtQuerySymbolicLinkObject
NtQueryValueKey
NtSetValueKey
NtUnmapViewOfSection
NtWriteVirtualMemory
RtlAllocateAndInitializeSid
RtlAnsiStringToUnicodeString
RtlCharToInteger
RtlCopyLuid
RtlCopyUnicodeString
RtlCreateSecurityDescriptor
RtlCreateTagHeap
RtlCreateUnicodeString
RtlCreateUserThread
RtlEqualSid
RtlExpandEnvironmentStrings_U
RtlFreeUnicodeString
RtlInitializeCriticalSectionAndSpinCount
RtlLeaveCriticalSection
RtlNtStatusToDosError
RtlPrefixUnicodeString
RtlSetDaclSecurityDescriptor
NtQueryObject
RtlUpcaseUnicodeChar
strstr
swprintf
wcscat
wcscpy
wcslen
NtCreateEvent
NtCreateSection
NtCreateSymbolicLinkObject
NtDuplicateObject
NtMakeTemporaryObject
NtMapViewOfSection
NtNotifyChangeKey
NtOpenKey
NtQueryDefaultLocale
NtQueryInformationProcess
RtlUnlockHeap
rpcrt4
RpcBindingSetAuthInfoExA
RpcBindingSetObject
RpcEpRegisterA
RpcBindingSetAuthInfoA
RpcMgmtEnableIdleCleanup
RpcMgmtEpEltInqNextA
RpcMgmtInqIfIds
RpcMgmtInqStats
RpcMgmtSetAuthorizationFn
RpcNetworkInqProtseqsA
RpcProtseqVectorFreeA
RpcServerInqBindings
RpcServerRegisterAuthInfoA
RpcServerRegisterIfEx
RpcServerUseAllProtseqsEx
RpcServerUseProtseqEpExA
RpcServerUseProtseqExA
RpcSmClientFree
RpcSmEnableAllocate
RpcSsAllocate
RpcSsDestroyClientContext
RpcSsDisableAllocate
RpcSsFree
UuidCreate
UuidCreateSequential
UuidToStringA
data_into_ndr
double_array_from_ndr
long_from_ndr_temp
short_array_from_ndr
short_from_ndr_temp
tree_peek_ndr
RpcBindingServerFromClient
RpcBindingInqOption
RpcBindingInqObject
MesInqProcEncodingId
MesHandleFree
MesEncodeDynBufferHandleCreate
MesDecodeIncrementalHandleCreate
MIDL_wchar_strcpy
IUnknown_QueryInterface_Proxy
CStdStubBuffer_QueryInterface
RpcEpUnregister
crtdll
wcschr
strcmp
setbuf
memchr
isleadbyte
fsetpos
_wcsicoll
_sopen
_mbctombb
_getdllprocaddr
_exit
_execve
_chdrive
_beep
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ