Static task
static1
Behavioral task
behavioral1
Sample
66ae90086b589486b46177448bf5a452_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
66ae90086b589486b46177448bf5a452_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
66ae90086b589486b46177448bf5a452_JaffaCakes118
-
Size
3KB
-
MD5
66ae90086b589486b46177448bf5a452
-
SHA1
d24f9719829ec04041b0350df50cecdbcf30e082
-
SHA256
fc559b561c3200e0a4713537b23ec5d52ee6f232e8e9bcae3a113e436ea59eef
-
SHA512
1c7419f73bddf41708bc299207a46c05a6dbcbcae878affd1c8a047c204ac3c532dc090ccab561b0efec7b946f92e2993d4dc16505e2684f6de183aaebe2b30b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66ae90086b589486b46177448bf5a452_JaffaCakes118
Files
-
66ae90086b589486b46177448bf5a452_JaffaCakes118.dll windows:4 windows x86 arch:x86
e809074c39c3ea9d5d5d83af781af84f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
CloseHandle
CreateThread
TerminateProcess
user32
CallNextHookEx
GetWindowTextA
GetAncestor
SetWindowsHookExA
Sections
.text Size: 512B - Virtual size: 380B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 450B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MySec Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 126B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ