Static task
static1
Behavioral task
behavioral1
Sample
62d5d6a38ad15c47f077cdee51a41c1f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62d5d6a38ad15c47f077cdee51a41c1f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
62d5d6a38ad15c47f077cdee51a41c1f_JaffaCakes118
-
Size
28KB
-
MD5
62d5d6a38ad15c47f077cdee51a41c1f
-
SHA1
4840540c5656ec6907e13589d979f464bb94a791
-
SHA256
af0ff8b9d1a0146087bc6788c1b4921f50fee63818abfa9741352888ef9ed4c5
-
SHA512
00e6739197054c76027d9dda23c3882b2dcb898cdb81c55c232b13aa0dd980297a977ee997e03e2782fcbfc0c744f23600bc3419329350ac33e6c7e4a0251191
-
SSDEEP
384:vjlBATyZYpMbkdLecd2eBrAtfSPOvDbJn3veFnuBBQARQkVovNmVRW6vI:vjlBSAcMg8uGTbJfyuBBQARQkGmVRtv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 62d5d6a38ad15c47f077cdee51a41c1f_JaffaCakes118
Files
-
62d5d6a38ad15c47f077cdee51a41c1f_JaffaCakes118.dll windows:4 windows x86 arch:x86
b22ba29f63f8506c6feccdb1e52dc3b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
atoi
sscanf
strstr
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
ws2_32
gethostname
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
kernel32
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
IsBadReadPtr
TerminateThread
Sleep
ReadProcessMemory
OpenProcess
LeaveCriticalSection
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
LoadLibraryA
MoveFileExA
ReadFile
VirtualAlloc
VirtualFree
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
InitializeCriticalSection
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
DeleteCriticalSection
EnterCriticalSection
WriteFile
user32
GetWindowTextA
EnumWindows
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
wsprintfA
CallNextHookEx
FindWindowA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ole32
StringFromGUID2
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 868B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ