_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
67f58df9416892dd4894a8a1f74013a6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67f58df9416892dd4894a8a1f74013a6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
67f58df9416892dd4894a8a1f74013a6_JaffaCakes118
-
Size
26KB
-
MD5
67f58df9416892dd4894a8a1f74013a6
-
SHA1
ece55c23249ea4141c5478e3e3f67155d54d819e
-
SHA256
afead80f25129ee97a00cbab06f8a635a22e48a2d59192e2d17d293a5a9a4d3e
-
SHA512
f2bd7dc00fada7344948145e0ff8167b28eb0fce54aa39f4848780b2087a7d4c8130a5032f7fd0e7244eec6186b917207ad9a20734f17774fc71cc5908dc7676
-
SSDEEP
384:U8f9pSIP0Et3ivBPA5j4b/Wlrj3B6DAYjUq5ClQqD9+yyp:HiY3ivKx0e5rMkYjT5ecN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67f58df9416892dd4894a8a1f74013a6_JaffaCakes118
Files
-
67f58df9416892dd4894a8a1f74013a6_JaffaCakes118.dll windows:4 windows x86 arch:x86
12337566696d62b8d4f866d96c4398ab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WaitForSingleObject
CreateMutexA
ReleaseMutex
LoadLibraryA
GetModuleHandleA
FreeLibraryAndExitThread
CreateThread
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
DisableThreadLibraryCalls
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
VirtualFree
GetTempPathA
VirtualAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
Module32Next
Module32First
GetCurrentProcessId
VirtualQuery
GetSystemInfo
GetProcAddress
WriteFile
CreateFileA
GetShortPathNameA
GetVersionExA
GetTempFileNameA
CreateProcessA
DeleteFileA
Sleep
OpenMutexA
CreateEventA
PulseEvent
VirtualProtect
CloseHandle
user32
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
EnumDesktopWindows
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyA
RegCloseKey
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
InternetOpenA
InternetCrackUrlA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
DeleteUrlCacheEntry
InternetConnectA
urlmon
URLDownloadToFileA
ws2_32
setsockopt
WSACleanup
closesocket
msvcrt
fclose
_adjust_fdiv
_initterm
_onexit
__dllonexit
_ismbcspace
_mbsinc
memmove
abs
memcmp
_mbsnbicmp
malloc
free
strcpy
_mbsstr
printf
_mbscmp
_mbsupr
_ismbcprint
_snprintf
memset
_mbsrchr
_mbschr
memcpy
??2@YAPAXI@Z
atoi
_mbsicmp
_mbstok
strcat
_memicmp
_mbsnbcpy
strlen
fgets
fopen
sprintf
__CxxFrameHandler
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ