_Set@16
Static task
static1
Behavioral task
behavioral1
Sample
644f4950f8f639fad3b3dcd7601cc6e2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
644f4950f8f639fad3b3dcd7601cc6e2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
644f4950f8f639fad3b3dcd7601cc6e2_JaffaCakes118
-
Size
88KB
-
MD5
644f4950f8f639fad3b3dcd7601cc6e2
-
SHA1
93e4f43f7291959c0606b9fa089433472274b3c6
-
SHA256
91486d8d01e7a24303c84e559e80da95c1ac083db9cc85e0e95dd77a1d901bb4
-
SHA512
9734f23c9783eef41da77ea31c687b4077d3d35a69292714ea537d765902b0e5c7a526b29169db6e85a819308b66cce16427b9d992fae2aa20be68511412a45f
-
SSDEEP
768:p2bPAblzLLgVQ76k04w63jJwMTClM4Ou3e7eG+7cu1BWSPbcVUH9m63Tn:ce6YFN8zLx1vbcVUH9JT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 644f4950f8f639fad3b3dcd7601cc6e2_JaffaCakes118
Files
-
644f4950f8f639fad3b3dcd7601cc6e2_JaffaCakes118.dll windows:4 windows x86 arch:x86
415120fcbbba5007c6f92a7e1c1c7732
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
IsBadStringPtrA
UnmapViewOfFile
lstrlenA
MapViewOfFile
CreateFileMappingA
CloseHandle
OpenFileMappingA
WideCharToMultiByte
lstrlenW
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualProtect
CreateThread
GetTickCount
VirtualAlloc
VirtualFree
VirtualQuery
HeapCreate
GetSystemInfo
lstrcpyA
InterlockedIncrement
ExitProcess
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentThreadId
GetWindowsDirectoryA
GetLastError
lstrcatA
GetCommandLineA
GetCurrentDirectoryA
OpenProcess
ReleaseMutex
CreateMutexA
Process32Next
TerminateProcess
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
GetCurrentProcess
Module32Next
Module32First
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
GetModuleHandleA
Sleep
GetCurrentProcessId
user32
wsprintfA
CallNextHookEx
PostThreadMessageA
UnhookWindowsHookEx
GetMessageA
SetWindowsHookExA
GetWindowThreadProcessId
EnumWindows
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shlwapi
PathFileExistsA
StrStrIA
StrStrW
StrStrA
msvcrt
_stricmp
_memicmp
_adjust_fdiv
_initterm
isprint
strrchr
atol
fopen
fseek
ftell
rewind
strstr
__CxxFrameHandler
isdigit
sscanf
sprintf
atoi
_itoa
isspace
isalnum
free
malloc
fgetc
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ