CLSIDFromStringByBitness
Static task
static1
Behavioral task
behavioral1
Sample
77382a73999e593df837333dd910d862_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77382a73999e593df837333dd910d862_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
77382a73999e593df837333dd910d862_JaffaCakes118
-
Size
172KB
-
MD5
77382a73999e593df837333dd910d862
-
SHA1
6c85da130ae673e20433e0070a60b6eb4f03e0ce
-
SHA256
50d7359c84dae74c667da7e68fd8713e35c4bb6ed739252b60896bb03a74d094
-
SHA512
b8845b466b7845ebfee46dc2fc9f1aa8534101c4dea98081618f686f2eedbff66489295ac0e23ef8ca1e3e9f69210aece066dc0b5390ef491e4a428e2206194a
-
SSDEEP
3072:NHcEPVmfpJ4EMZtsuAQY092ZVgWEQK/kxxicxExbj3TBkS8v3caxtijo:NHcSIhJ4EMZqRQR920WET/kxpQjBkXn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77382a73999e593df837333dd910d862_JaffaCakes118
Files
-
77382a73999e593df837333dd910d862_JaffaCakes118.dll windows:4 windows x86 arch:x86
34dff34f9c5b6d7f3c9753d707280601
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
ExitProcess
FindResourceA
GetACP
GetCommandLineA
GetConsoleMode
GetCurrentProcessId
GetModuleHandleA
GetNumberFormatA
GetOEMCP
GetStartupInfoA
HeapAlloc
HeapCreate
HeapDestroy
HeapReAlloc
MultiByteToWideChar
ReadFile
RtlUnwind
SetErrorMode
SetLastError
SetUnhandledExceptionFilter
lstrcatA
lstrcpynA
msvcrt
free
wcscat
__set_app_type
user32
DefWindowProcA
EndDialog
GetCapture
oleaut32
RevokeActiveObject
SafeArrayAllocDescriptor
SafeArrayAccessData
VarBstrCmp
SysReAllocString
SetErrorInfo
SafeArrayDestroy
ClearCustData
GetErrorInfo
OleIconToCursor
SafeArrayCreate
shlwapi
StrStrW
StrStrA
Exports
Exports
Sections
.text Size: 104KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ