Static task
static1
Behavioral task
behavioral1
Sample
6413a822559468a0742d76db0a97b7f1_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6413a822559468a0742d76db0a97b7f1_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6413a822559468a0742d76db0a97b7f1_JaffaCakes118
-
Size
23KB
-
MD5
6413a822559468a0742d76db0a97b7f1
-
SHA1
c3de8ea2a929ca7c406eb85f1662809551ee1c9b
-
SHA256
f56e69f11039b0abadb3ef03617917dc795d7f81f92e8e918889251917793a51
-
SHA512
dbe65e8ca42cd08066ae2e644e3e5cc7ecfcb709caa6baadab281fa717b08062f93dc135a27f046b75269b2a6b38914103da6660db12931c4fefb3b67e543d19
-
SSDEEP
384:8XkwrX2pUWscu4apE/RH7m89RO78IMKmYfkLf+rUDL2OwcfoLhXMR1/:6kmCl+4aO5muRO78IMKwqrUacALhXq1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6413a822559468a0742d76db0a97b7f1_JaffaCakes118
Files
-
6413a822559468a0742d76db0a97b7f1_JaffaCakes118.dll windows:4 windows x86 arch:x86
44118bb6e7a509f5685826049d1f89be
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
VirtualProtectEx
InitializeCriticalSection
GlobalFree
GlobalUnlock
GetPrivateProfileStringA
SetUnhandledExceptionFilter
Thread32Next
SetThreadContext
OpenThread
Thread32First
IsBadReadPtr
WideCharToMultiByte
Process32First
GetModuleHandleA
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
Process32Next
CloseHandle
TerminateThread
Sleep
CreateThread
GlobalAlloc
GlobalLock
LoadLibraryA
GetProcAddress
GetCurrentThread
GetCurrentProcessId
OpenMutexA
ReadProcessMemory
CreateMutexA
user32
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
_strlwr
free
_initterm
malloc
_adjust_fdiv
_stricmp
strrchr
memset
wcslen
fopen
strcat
sprintf
strcpy
memcpy
??2@YAPAXI@Z
strlen
strncpy
strstr
??3@YAXPAX@Z
sscanf
fclose
fread
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ