Static task
static1
Behavioral task
behavioral1
Sample
6ae5acd1767584cc893f344adc69c3c3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6ae5acd1767584cc893f344adc69c3c3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6ae5acd1767584cc893f344adc69c3c3_JaffaCakes118
-
Size
21KB
-
MD5
6ae5acd1767584cc893f344adc69c3c3
-
SHA1
74a2cccfa7d35189e33fbd7e11e6377088538a75
-
SHA256
a7db75db6605445b6dc5b513aaaf769f335920d250682acaa72b9c2113e426cb
-
SHA512
e79a9889bc8c8e445cd79bb750410dda0cf38bd3df2cbb165a1bcbbec13783d97034b861d0184da41d8bdbff70a1d8e30e1be43b8e8c23914eeb9abf5e1d6bca
-
SSDEEP
192:8HpCQKhrSFSexXR3rKBACUjfRJAQLQCNeYurEI4hgw/M8vo1N9buzAS9vqQ2IMrP:dF4cBWPAoV4B+68v8N0zAkO752
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ae5acd1767584cc893f344adc69c3c3_JaffaCakes118
Files
-
6ae5acd1767584cc893f344adc69c3c3_JaffaCakes118.dll windows:4 windows x86 arch:x86
9a13e0ec1115ba86aaf7e24af6326517
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CreateMutexA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
FindFirstFileA
VirtualProtectEx
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
TerminateProcess
ReleaseMutex
Module32Next
Module32First
ReadFile
GetModuleFileNameA
CreateThread
Sleep
WinExec
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetSystemDirectoryA
lstrlenA
GetModuleHandleA
GetProcAddress
WriteFile
CloseHandle
GetTempPathA
GetCurrentProcess
GetTickCount
user32
EnumWindows
wsprintfA
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetWindowThreadProcessId
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
shlwapi
StrStrIA
wininet
InternetCloseHandle
msvcrt
_itoa
_purecall
memcpy
??2@YAPAXI@Z
strstr
strncat
strcat
strlen
memset
strcpy
??3@YAXPAX@Z
strcmp
Sections
.bss Size: - Virtual size: 13KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ