_LibMain@12
Static task
static1
Behavioral task
behavioral1
Sample
669441c9fb85295392894e089d42209d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
669441c9fb85295392894e089d42209d_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
669441c9fb85295392894e089d42209d_JaffaCakes118
-
Size
6KB
-
MD5
669441c9fb85295392894e089d42209d
-
SHA1
6756d856f4a78e24db6a3af8f55d22657e8b0141
-
SHA256
205b86b3b08c57b6eba8d06b6b365958eb390c57f37519346b4f190e366764d5
-
SHA512
52631175964e55c3afe7d9d02d0ac79d572bb4a3dd272c82c1851149d2dc336b8a34531d857835342454a3090327597e3affdcb2bb857acaaf2c99cbaa59f484
-
SSDEEP
48:6xYhuJA5YVO9GVkaHUWwlFWOlxq50xnf0aBbgL4HD/c9JkWao:eYu89GVkaHU3lFZloOxxq4HQXrao
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 669441c9fb85295392894e089d42209d_JaffaCakes118
Files
-
669441c9fb85295392894e089d42209d_JaffaCakes118.dll windows:1 windows x86 arch:x86
8d4ff187806b846a63697ee1e07097fe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ExitProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetModuleFileNameA
CloseHandle
GetProcessHeap
GetSystemDirectoryA
GlobalAddAtomA
IsDebuggerPresent
OpenMutexA
RtlUnwind
WinExec
crtdll
_fdopen
_open_osfhandle
_sleep
fclose
_cexit
malloc
printf
raise
setbuf
srand
strcat
strcpy
Exports
Exports
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84B - Virtual size: 84B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.data Size: 180B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 868B - Virtual size: 868B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 192B - Virtual size: 192B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
.edata Size: 72B - Virtual size: 72B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ