CPlApplet
Static task
static1
Behavioral task
behavioral1
Sample
67ccdc8e36ffe6aaba40cb14d2332cba_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
67ccdc8e36ffe6aaba40cb14d2332cba_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
67ccdc8e36ffe6aaba40cb14d2332cba_JaffaCakes118
-
Size
84KB
-
MD5
67ccdc8e36ffe6aaba40cb14d2332cba
-
SHA1
c992433fba029292f4f2c282876261390fff62fa
-
SHA256
588b35613fbab417c6fd18868e509b3e76018ed95bddaea5f4f387af3e9ab494
-
SHA512
1e6b5fbcf652f7a449034dcdfc0adbc33c20074f73de2f4911ed3384673d734a04e18412b881f4617fba10e283dafb77fe127d61d5c24a0fee6318b6252cc091
-
SSDEEP
1536:RTBF8WFiOqls8dHYarelg0z1AIZty3RsZiWZsOIT5:5B8Fd1ePz7Ly3O8wlIT5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67ccdc8e36ffe6aaba40cb14d2332cba_JaffaCakes118
Files
-
67ccdc8e36ffe6aaba40cb14d2332cba_JaffaCakes118.dll windows:4 windows x86 arch:x86
16fe591f70333ac06cc4d384a1c85b4a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
LeaveCriticalSection
GetTickCount
LoadLibraryA
UnmapViewOfFile
SetLastError
VirtualProtect
EnterCriticalSection
WriteFile
SetEvent
CreateProcessA
GetSystemInfo
CreateDirectoryA
InitializeCriticalSectionAndSpinCount
GetProcAddress
CopyFileA
GetComputerNameA
HeapFree
GetModuleFileNameA
GlobalAlloc
MapViewOfFile
CloseHandle
AllocConsole
DeleteCriticalSection
FindNextVolumeW
GetSystemPowerStatus
lstrcmpiA
GetAtomNameW
WaitForMultipleObjects
FlushConsoleInputBuffer
SetVolumeMountPointW
GetCurrentThreadId
SetMailslotInfo
GlobalFree
EnumResourceNamesW
TransmitCommChar
GetVolumeInformationW
IsWow64Process
MoveFileExW
AssignProcessToJobObject
WaitNamedPipeA
SwitchToThread
FindNextVolumeMountPointW
GetCommandLineA
IsBadReadPtr
VirtualAllocEx
SetFileApisToOEM
GetCurrentProcessId
PeekNamedPipe
GlobalReAlloc
EnumResourceLanguagesA
FindFirstChangeNotificationW
LocalAlloc
GetBinaryTypeA
AddRefActCtx
SetConsoleWindowInfo
SetConsoleCursorPosition
DeleteVolumeMountPointW
FindFirstFileExW
GetEnvironmentStringsW
FindClose
GetConsoleOutputCP
WaitNamedPipeW
CreateDirectoryW
CreateRemoteThread
GetCurrentActCtx
GetFileAttributesExW
WriteProfileStringW
ReadDirectoryChangesW
WriteFileEx
FindResourceExW
VerSetConditionMask
GetDateFormatA
HeapValidate
GetCurrencyFormatA
SetFilePointer
lstrlenW
OpenJobObjectW
DeviceIoControl
GetLocaleInfoA
user32
EnableWindow
ScreenToClient
CallMsgFilterW
AdjustWindowRect
SendMessageA
GetNextDlgGroupItem
GetMenuItemID
SetClassLongW
GetForegroundWindow
GetTabbedTextExtentA
GetDlgItemTextW
DrawTextExW
GetCaretBlinkTime
InsertMenuItemA
PackDDElParam
ModifyMenuW
InsertMenuA
TranslateMessage
GetClassLongA
GetDesktopWindow
IsZoomed
DrawTextW
GetProcessDefaultLayout
GetWindowTextW
FreeDDElParam
WinHelpW
BringWindowToTop
MessageBoxIndirectW
SubtractRect
ChildWindowFromPoint
ShowWindow
LoadStringW
GetMenuCheckMarkDimensions
RemovePropA
PostQuitMessage
SetMenu
SetRectEmpty
MessageBoxA
LoadMenuW
ToUnicodeEx
MoveWindow
GetThreadDesktop
GetInputState
OpenWindowStationW
CreateDialogParamA
WaitMessage
UnionRect
ShowScrollBar
OpenDesktopA
ChildWindowFromPointEx
DialogBoxParamW
SetWindowRgn
DefWindowProcW
PeekMessageW
SetCursor
LookupIconIdFromDirectory
TranslateAcceleratorA
GetDialogBaseUnits
IsCharAlphaNumericA
MsgWaitForMultipleObjects
LoadIconA
PeekMessageA
SetWindowsHookExA
GetMessageA
SetTimer
shlwapi
PathGetCharTypeA
PathAppendA
StrRetToBufW
PathAddBackslashW
StrChrW
UrlGetPartW
PathCombineW
PathRemoveBlanksW
PathFindExtensionA
StrTrimW
StrCmpNIW
PathCreateFromUrlW
StrToIntA
PathRemoveArgsW
PathUnquoteSpacesW
PathMatchSpecW
PathStripToRootW
PathFindNextComponentW
PathAddExtensionW
PathCompactPathW
PathIsUNCServerW
StrChrIW
StrStrIW
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ