Static task
static1
Behavioral task
behavioral1
Sample
75d2fbe78cf79259c85b36aac0e41128_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
75d2fbe78cf79259c85b36aac0e41128_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
75d2fbe78cf79259c85b36aac0e41128_JaffaCakes118
-
Size
103KB
-
MD5
75d2fbe78cf79259c85b36aac0e41128
-
SHA1
759db45c7c96429ff0d986bfb7328829e6be2102
-
SHA256
72a444e0673f81e5a168f58fbf5cebfccc4f607dc8b3269e58fc6c3216d2477c
-
SHA512
033639a78b894ed7d47e8ad857232f5b09852f6e1aabc5898def22d4423a77f237d79045b4772a154d701bc62c94f5fd2be2031fc9e91a7a8ddb0eff970a3f1a
-
SSDEEP
3072:Rh0an/WHjCVlkPE/wkIffFZMKN0o9Wi2rfx8:Uan8ukQwkIlPusD2zx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75d2fbe78cf79259c85b36aac0e41128_JaffaCakes118
Files
-
75d2fbe78cf79259c85b36aac0e41128_JaffaCakes118.dll windows:4 windows x86 arch:x86
baef336e26d147e7fe769530b1f497d8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleFileNameA
GetProcAddress
lstrlenA
GetCurrentThreadId
FormatMessageW
LocalAlloc
LocalFree
ExpandEnvironmentStringsW
lstrlenW
MultiByteToWideChar
GetLocalTime
WideCharToMultiByte
GetWindowsDirectoryA
SearchPathW
FindResourceExW
SetLastError
LoadLibraryExW
MapViewOfFile
CreateFileMappingW
CreateFileW
GetVersionExW
GetLocaleInfoW
UnmapViewOfFile
FormatMessageA
CloseHandle
InterlockedCompareExchange
FreeEnvironmentStringsW
TerminateProcess
WaitForSingleObject
InterlockedExchange
CreateThread
InterlockedIncrement
InterlockedDecrement
GetComputerNameA
WriteFile
ReadFile
DeviceIoControl
ExpandEnvironmentStringsA
CreateDirectoryA
LoadLibraryA
GetCurrentThread
GetTickCount
GetPrivateProfileIntA
CreateFileA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GlobalFree
GetModuleHandleA
DisableThreadLibraryCalls
GetProcessHeap
HeapAlloc
HeapFree
FreeEnvironmentStringsA
SetEnvironmentVariableW
DebugBreak
GetExitCodeThread
GetCurrentProcess
InitializeCriticalSection
FreeLibrary
LoadLibraryExA
Sleep
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetUserDefaultLangID
LoadLibraryW
DeleteCriticalSection
GetUserDefaultLCID
GetLocaleInfoA
GetVersionExA
GetCommandLineA
GetLastError
VirtualProtect
user32
IsWindowVisible
CharNextA
EnumThreadWindows
wsprintfA
wvsprintfA
PostMessageA
MessageBoxA
SetFocus
LoadStringW
SendMessageTimeoutW
LoadStringA
GetWindowThreadProcessId
SetForegroundWindow
AttachThreadInput
GetDesktopWindow
IsWindowEnabled
GetWindowTextA
GetWindowTextLengthA
GetWindowTextW
GetWindowTextLengthW
FindWindowA
FindWindowW
GetWindow
keybd_event
VkKeyScanA
SendMessageTimeoutA
advapi32
RegSetValueExA
RegQueryInfoKeyW
RegEnumValueW
RegEnumValueA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumKeyExA
RegCreateKeyExA
RegCloseKey
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegDeleteKeyA
RegQueryValueExA
EqualSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
FreeSid
AllocateAndInitializeSid
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExA
ole32
CoTaskMemFree
StringFromCLSID
msvcrt
fopen
_ismbcdigit
_ismbcspace
fclose
wcsncmp
bsearch
_onexit
_lock
__dllonexit
_unlock
_adjust_fdiv
_amsg_exit
_initterm
_callnewh
_CxxThrowException
_wcsicmp
_ultoa
memset
fwrite
strncpy
__RTtypeid
wcscmp
_ultow
_wtoi
wcslen
fprintf
memcpy
_errno
_vsnwprintf
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
time
_except_handler3
_XcptFilter
malloc
free
_snprintf
_itoa
_vsnprintf
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ