od.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6f0da0c861fa6f1bbea2ef8e91a93988_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f0da0c861fa6f1bbea2ef8e91a93988_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6f0da0c861fa6f1bbea2ef8e91a93988_JaffaCakes118
-
Size
59KB
-
MD5
6f0da0c861fa6f1bbea2ef8e91a93988
-
SHA1
52a4866a889a9f4998548d0ac1d693ac820e8942
-
SHA256
c8ca5568ea6e7d0652e1914e51d335d46b8743a8941228373f59691ff8b20564
-
SHA512
e6aaf20a75ca045d8db63a32555c916215f9c10ae941eb48e1f99bf633961da2b12bcaf6a40f016ff802c10aa84a6df3b8aed3ae569d9e6b5f8c4821c4dba5f5
-
SSDEEP
1536:88DjZUupMbnURL7GP9UWe33yjRF91nyX9FYSL20:8gjifzUR/GP9UWe33kF91yXYSL20
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f0da0c861fa6f1bbea2ef8e91a93988_JaffaCakes118
Files
-
6f0da0c861fa6f1bbea2ef8e91a93988_JaffaCakes118.dll windows:4 windows x86 arch:x86
dbb268a858c1392d055274ded7894cf5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
GetModuleFileNameA
GetModuleHandleA
InterlockedDecrement
GetProcessHeap
HeapFree
EnumCalendarInfoExA
HeapValidate
IsValidLanguageGroup
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringA
WaitForMultipleObjects
HeapAlloc
ExitProcess
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegDeleteValueW
RegEnumValueA
RegOpenKeyExW
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 494B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ