_LibMain@12
Static task
static1
Behavioral task
behavioral1
Sample
6fad5bd8062ed32187b6d205945075ed_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fad5bd8062ed32187b6d205945075ed_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6fad5bd8062ed32187b6d205945075ed_JaffaCakes118
-
Size
44KB
-
MD5
6fad5bd8062ed32187b6d205945075ed
-
SHA1
6c5e237501ac7567985cac29357cc3da58a5a7e8
-
SHA256
4c3d3b88c73b6e2e753ec93def0e003bbe3640facc28a8f23c32205b772be1fe
-
SHA512
2da1a223ead6e3beb00fea210a4a04a56d268109612be7ff6c189071c46a95060527bf21a508730b765c3e40030a39d6f2342820a6d79e369fda257b11cf3460
-
SSDEEP
768:OUizanGkx1raFAZuHnDR1YWB3SwYdLzkffutbbLPV8wvXn4Bc6nMhU/Ul3oTDKOO:XizaLx1raFAZuHnDR1YWB3SwYdLzkfWF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6fad5bd8062ed32187b6d205945075ed_JaffaCakes118
Files
-
6fad5bd8062ed32187b6d205945075ed_JaffaCakes118.dll windows:1 windows x86 arch:x86
4b1b23729b6d2c564f82753c59c7d0ab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
htons
ioctlsocket
inet_addr
inet_ntoa
listen
ntohs
recv
select
accept
send
sendto
setsockopt
socket
gethostbyaddr
gethostbyname
bind
closesocket
WSAGetLastError
WSAStartup
WSACleanup
__WSAFDIsSet
connect
getpeername
getsockname
WSASocketA
htonl
shell32
ShellExecuteA
kernel32
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCurrentProcess
GetDateFormatA
GetEnvironmentStringsA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetTimeFormatA
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
LoadLibraryA
CreateDirectoryA
MoveFileA
OpenProcess
PeekNamedPipe
CreateFileA
ReadFile
RtlUnwind
SetFilePointer
CreateMutexA
Sleep
TerminateProcess
TerminateThread
CreatePipe
CreateProcessA
WriteFile
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
DeleteFileA
DuplicateHandle
user32
GetWindowTextA
GetForegroundWindow
GetKeyState
GetAsyncKeyState
ExitWindowsEx
CharUpperBuffA
CharToOemA
advapi32
GetUserNameA
crtdll
_fdopen
_open_osfhandle
atoi
exit
fclose
fopen
fputs
fwrite
_cexit
malloc
memcpy
memset
printf
raise
rand
setbuf
sprintf
srand
strcat
strcmp
strcpy
strncpy
strstr
strtok
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 84B - Virtual size: 84B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
.edata Size: 84B - Virtual size: 84B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ