Static task
static1
Behavioral task
behavioral1
Sample
682e2024a229429202cb86dff22c7564_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
682e2024a229429202cb86dff22c7564_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
682e2024a229429202cb86dff22c7564_JaffaCakes118
-
Size
66KB
-
MD5
682e2024a229429202cb86dff22c7564
-
SHA1
adffba9e3b0f2f387b9b43793f274aa102df981f
-
SHA256
c19093138028ea6a6a6665e270c36558757931f1d7f6f88910b08e39903a1774
-
SHA512
289fdfd7d1e6ff58af8a07df117a93b86777e4a9b4e68c1406a43f85de7ea22be7511795a569b47d790289d8c8e7cc98f64e2f679819009d9293e5d03575ccd7
-
SSDEEP
1536:iuDxWf9xmOPtwwJcx1BFTor3TE6ReTL0n63huKwX:iusfmSUxC3tRQ0n62X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 682e2024a229429202cb86dff22c7564_JaffaCakes118
Files
-
682e2024a229429202cb86dff22c7564_JaffaCakes118.dll windows:5 windows x86 arch:x86
af99cefc9e3a2c01c0a01fb0dd2ccc4f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
ExitProcess
CreateFileA
GetProcAddress
LoadLibraryA
lstrcpyA
lstrlenA
GetWindowsDirectoryA
GetVersion
AllocConsole
AssignProcessToJobObject
BeginUpdateResourceA
BuildCommDCBAndTimeoutsA
CallNamedPipeA
CopyFileExA
CreateDirectoryA
CreateRemoteThread
CreateTapePartition
DeleteCriticalSection
DeleteTimerQueueTimer
EnumCalendarInfoExA
EnumResourceNamesA
FindCloseChangeNotification
FindFirstChangeNotificationA
FindFirstFileA
FindNextFileW
FindNextVolumeA
FoldStringW
FreeEnvironmentStringsA
FreeResource
GetAtomNameA
GetCPInfo
GetCPInfoExA
GetCommTimeouts
GetCompressedFileSizeA
GetConsoleAliasA
GetConsoleAliasesW
GetConsoleScreenBufferInfo
GetConsoleTitleA
GetCurrentConsoleFont
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceW
GetEnvironmentVariableA
GetExitCodeProcess
GetHandleInformation
GetLocaleInfoW
GetNumberOfConsoleInputEvents
GetPrivateProfileStringW
GetProfileSectionW
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GetVolumeNameForVolumeMountPointA
GlobalAddAtomA
GlobalAddAtomW
GlobalCompact
GlobalReAlloc
Heap32ListNext
HeapFree
HeapSize
HeapWalk
InitializeCriticalSectionAndSpinCount
InterlockedExchange
IsBadCodePtr
IsDebuggerPresent
IsValidLanguageGroup
LocalLock
LockFileEx
Module32First
OpenSemaphoreA
OpenSemaphoreW
OutputDebugStringA
Process32FirstW
Process32NextW
ResetEvent
ScrollConsoleScreenBufferA
SetConsoleCP
SetConsoleDisplayMode
SetConsoleOutputCP
SetConsoleScreenBufferSize
SetCurrentDirectoryW
SetFileAttributesA
SetLocalTime
SetMessageWaitingIndicator
SetProcessAffinityMask
SetThreadPriorityBoost
SetVolumeLabelA
SetWaitableTimer
TerminateJobObject
UnhandledExceptionFilter
VerifyVersionInfoA
VirtualLock
VirtualProtectEx
WriteFileGather
WritePrivateProfileSectionA
WriteProfileStringA
_lcreat
_lread
lstrlenW
user32
LoadBitmapA
ChangeDisplaySettingsA
ChangeMenuW
CharLowerBuffW
CharNextA
CharPrevExA
CharToOemBuffW
CharUpperBuffW
CheckMenuRadioItem
CreateDesktopW
CreateIconFromResource
DdeCreateStringHandleA
DeferWindowPos
DlgDirListComboBoxW
DlgDirSelectExA
DragObject
DrawTextExA
EnableMenuItem
EnumDisplaySettingsA
EnumDisplaySettingsW
EnumPropsA
EnumPropsExA
EnumWindows
ExcludeUpdateRgn
FlashWindow
FlashWindowEx
GetCapture
GetCaretPos
GetClipboardOwner
GetDlgItem
GetKeyNameTextW
GetMenuBarInfo
GetMenuDefaultItem
GetMenuItemCount
GetMenuItemRect
GetMessagePos
GetOpenClipboardWindow
GetProcessWindowStation
GetQueueStatus
GetScrollInfo
GetScrollRange
GetTabbedTextExtentA
GetWindowInfo
GetWindowModuleFileNameW
GetWindowRgn
IMPQueryIMEW
ImpersonateDdeClientWindow
IsRectEmpty
LoadMenuA
LoadMenuIndirectW
LookupIconIdFromDirectory
MapVirtualKeyExW
MapWindowPoints
MessageBoxIndirectW
ModifyMenuA
MsgWaitForMultipleObjects
NotifyWinEvent
OpenClipboard
OpenWindowStationW
PeekMessageA
PostMessageA
RegisterClassExA
RegisterDeviceNotificationA
ReleaseCapture
ScreenToClient
SendMessageCallbackA
SendMessageCallbackW
SendMessageW
SendNotifyMessageA
SetCaretBlinkTime
SetCaretPos
SetCursorPos
SetDeskWallpaper
SetMenuItemBitmaps
SetScrollInfo
SetWindowRgn
SetWindowTextW
SetWindowsHookA
SetWindowsHookExA
ShowWindow
TabbedTextOutW
TileChildWindows
TileWindows
ToUnicode
TranslateMDISysAccel
UnhookWindowsHookEx
VkKeyScanA
VkKeyScanExA
WINNLSEnableIME
WaitForInputIdle
ole32
CLIPFORMAT_UserMarshal
CLIPFORMAT_UserUnmarshal
CLSIDFromProgID
CLSIDFromString
CoBuildVersion
CoCreateInstance
CoCreateObjectInContext
CoDisableCallCancellation
CoEnableCallCancellation
CoFreeUnusedLibraries
CoGetCancelObject
CoGetInstanceFromFile
CoGetMarshalSizeMax
CoGetPSClsid
CoGetStdMarshalEx
CoInitialize
CoInstall
CoIsHandlerConnected
CoLockObjectExternal
CoMarshalInterThreadInterfaceInStream
CoQueryClientBlanket
CoRegisterClassObject
CoRegisterMallocSpy
CoRegisterSurrogateEx
CoRevokeMallocSpy
CoTaskMemAlloc
CoTaskMemRealloc
CoTestCancel
CoUnmarshalHresult
CoWaitForMultipleHandles
CreateAntiMoniker
CreateDataAdviseHolder
CreateGenericComposite
CreateILockBytesOnHGlobal
CreateStdProgressIndicator
DcomChannelSetHResult
DllDebugObjectRPCHook
EnableHookObject
GetHGlobalFromILockBytes
GetRunningObjectTable
HACCEL_UserFree
HBITMAP_UserFree
HBITMAP_UserMarshal
HBITMAP_UserSize
HBRUSH_UserSize
HENHMETAFILE_UserSize
HGLOBAL_UserSize
HICON_UserSize
HMETAFILEPICT_UserSize
HPALETTE_UserSize
HWND_UserFree
HWND_UserMarshal
HWND_UserSize
HWND_UserUnmarshal
IIDFromString
OleConvertIStorageToOLESTREAMEx
OleCreateEx
OleCreateLink
OleCreateLinkEx
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleGetIconOfFile
OleSaveToStream
OleSetAutoConvert
OleUninitialize
PropStgNameToFmtId
ReadClassStm
ReadFmtUserTypeStg
ReadOleStg
RegisterDragDrop
ReleaseStgMedium
SNB_UserSize
STGMEDIUM_UserSize
STGMEDIUM_UserUnmarshal
SetDocumentBitStg
StgCreatePropStg
StgCreateStorageEx
StgGetIFillLockBytesOnFile
StgOpenPropStg
StringFromGUID2
StringFromIID
UpdateDCOMSettings
UtConvertDvtd32toDvtd16
UtGetDvtd32Info
WdtpInterfacePointer_UserMarshal
WdtpInterfacePointer_UserUnmarshal
WriteStringStream
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 228KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ