___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
6f2cdedc8ff723a80718084136582f3e_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f2cdedc8ff723a80718084136582f3e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6f2cdedc8ff723a80718084136582f3e_JaffaCakes118
-
Size
319KB
-
MD5
6f2cdedc8ff723a80718084136582f3e
-
SHA1
8f9975ddff272efe9b99573ae82e95c10c9cb870
-
SHA256
5d02d2c153bb21ffb05090657b4da365a0bd73d2c1aaf1f0328f8f51ec12edd3
-
SHA512
4e8cf62527cf55ac66651cfdc4548ee0e428ede9216d77454d5d3a1d0bf9b31114df3f2ccc510b8a80be110cafbf44d5a9755ba80aebb6a988857681d767922f
-
SSDEEP
6144:lk//68knkeKOAWRmVtd/62w7lD51m4pCseReBd6yxex:mFknkmAaKabzJeRmUy4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f2cdedc8ff723a80718084136582f3e_JaffaCakes118
Files
-
6f2cdedc8ff723a80718084136582f3e_JaffaCakes118.dll windows:4 windows x86 arch:x86
14e716c2a8254c4035d76af2a3571054
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
ws2_32
socket
setsockopt
inet_addr
htons
WSAStartup
advapi32
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptReleaseContext
RegOpenKeyExA
RegQueryValueExA
kernel32
CheckRemoteDebuggerPresent
CloseHandle
CreateFileA
CreateFileMappingA
CreateThread
DeleteCriticalSection
DeleteFileA
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetExitCodeThread
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
IsDebuggerPresent
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OpenProcess
RaiseException
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetThreadLocale
SetThreadPriority
Sleep
SwitchToThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQuery
WideCharToMultiByte
WriteFile
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
EnumThreadWindows
GetClassNameA
GetDesktopWindow
GetTopWindow
GetWindow
GetWindowTextA
GetWindowThreadProcessId
MessageBoxA
wsprintfA
MessageBoxW
psapi
GetModuleInformation
Exports
Exports
Sections
.text Size: 138KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp0 Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tmp1 Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tmp2 Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ