winsockinit
Static task
static1
Behavioral task
behavioral1
Sample
746f767601428c6b583c762f75628133_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
746f767601428c6b583c762f75628133_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
746f767601428c6b583c762f75628133_JaffaCakes118
-
Size
8KB
-
MD5
746f767601428c6b583c762f75628133
-
SHA1
6871569b6c93e5c5b04e9592ab77517dabdc3243
-
SHA256
c2e48281b49bbdb0639b9d38796da8078b002eec989a953a0f4316eadcd27e34
-
SHA512
d945fb76602026f2b14d8d5c06c12e7bb04a929826055accac490a6cb02e8b911a7ce71f75fdcb91c4a7da0560ced6611a5414a3fcd355f89efeae13d3f59cec
-
SSDEEP
192:eR30UJh1F4yzp+ewOpvRQGWXDztd99j3Y8hBW:MDJKyzpgOpvCGWX1hj3Y8u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 746f767601428c6b583c762f75628133_JaffaCakes118
Files
-
746f767601428c6b583c762f75628133_JaffaCakes118.dll windows:4 windows x86 arch:x86
848d8d9aa4fcadb45a6c8bec79ad94ad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemDirectoryA
lstrcpyA
TerminateProcess
GetCurrentProcess
lstrcpynA
GetModuleHandleA
DisableThreadLibraryCalls
GetCommandLineA
CreateThread
lstrcatA
GetProcAddress
LoadLibraryA
FlushInstructionCache
WriteProcessMemory
VirtualAlloc
ReadProcessMemory
VirtualProtect
IsBadCodePtr
Sleep
WinExec
GetModuleFileNameA
lstrlenA
user32
CharLowerA
SetWindowsHookExA
CallNextHookEx
wsprintfA
FindWindowA
advapi32
RegCreateKeyA
RegSetValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ