Static task
static1
Behavioral task
behavioral1
Sample
78df7af4f25815621362907096f42cdb_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78df7af4f25815621362907096f42cdb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
78df7af4f25815621362907096f42cdb_JaffaCakes118
-
Size
52KB
-
MD5
78df7af4f25815621362907096f42cdb
-
SHA1
b485ccb6135a05d2a0f4ddcd4b4dea76ff995a20
-
SHA256
377979a38409b88f34ffafcd98101fcb46a5596364f02323d8b7a476b325a961
-
SHA512
8f8292ef8af54a7e5758bb8b03c065007d7124e5dbaed295d0d2d84dab46bc1962844f49b90fa2f5437eb6d61ea32605c7d5b464f4dc4ffb66deafe5d262ae7b
-
SSDEEP
768:C3zr2ztjgqRXxR17pzLA5RBhY0obExf0r1lBI1UHgwJH3YPWai/ny7tsMBVEn7NO:Cj2jgg/pnWRBBo4xi/BFH/nyZuL0n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78df7af4f25815621362907096f42cdb_JaffaCakes118
Files
-
78df7af4f25815621362907096f42cdb_JaffaCakes118.dll windows:5 windows x86 arch:x86
2e41e89b1867c31f0de13928c52a2452
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
lstrcpyA
lstrlenA
GetWindowsDirectoryA
CancelIo
CancelTimerQueueTimer
CommConfigDialogA
CreateHardLinkA
CreatePipe
DebugActiveProcess
DebugBreak
DeleteAtom
DeleteVolumeMountPointW
DisableThreadLibraryCalls
DosDateTimeToFileTime
EnumCalendarInfoExA
EnumCalendarInfoExW
EnumDateFormatsA
EnumSystemLocalesW
EnumUILanguagesW
FatalAppExitA
FatalAppExitW
FileTimeToLocalFileTime
FillConsoleOutputCharacterA
FindFirstFileExA
FindFirstFileW
FlushConsoleInputBuffer
FoldStringA
FreeConsole
FreeEnvironmentStringsW
FreeLibrary
GetBinaryTypeA
GetCPInfo
GetCommState
GetCommandLineW
GetComputerNameA
GetComputerNameExW
GetConsoleAliasExesLengthA
GetConsoleAliasesLengthW
GetConsoleFontSize
GetCurrentConsoleFont
GetDefaultCommConfigA
GetDiskFreeSpaceW
GetEnvironmentStringsA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLargestConsoleWindowSize
GetLogicalDriveStringsW
GetLongPathNameA
GetNumberFormatA
GetPriorityClass
GetPrivateProfileStringW
GetPrivateProfileStructW
GetProcAddress
GetProcessIoCounters
GetProfileSectionW
GetProfileStringA
GetProfileStringW
GetStdHandle
GetSystemDefaultUILanguage
GetSystemWindowsDirectoryA
GetTempFileNameW
GetThreadPriorityBoost
GlobalAddAtomA
GlobalFindAtomA
GlobalGetAtomNameW
GlobalMemoryStatusEx
VirtualAlloc
GlobalWire
Heap32First
HeapLock
HeapSize
IsBadCodePtr
IsBadHugeWritePtr
IsBadStringPtrW
IsProcessorFeaturePresent
IsValidCodePage
IsValidLanguageGroup
IsValidLocale
LoadLibraryA
LoadModule
LocalAlloc
LockResource
MapViewOfFile
Module32FirstW
MoveFileWithProgressW
OpenEventA
OpenFileMappingA
OpenFileMappingW
OpenWaitableTimerA
OutputDebugStringA
Process32Next
QueryInformationJobObject
ReadConsoleOutputCharacterA
ReplaceFileW
RtlMoveMemory
SearchPathW
SetCalendarInfoA
SetCommState
SetComputerNameExA
SetConsoleCP
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleDisplayMode
SetEndOfFile
SetErrorMode
SetFileApisToANSI
SetFileAttributesW
SetFilePointerEx
SetSystemPowerState
SetThreadContext
SetThreadPriority
SetVolumeMountPointA
SizeofResource
SuspendThread
Thread32First
TlsAlloc
TlsFree
TlsGetValue
UpdateResourceW
VerLanguageNameA
VerifyVersionInfoA
VerifyVersionInfoW
VirtualLock
VirtualProtectEx
WaitForMultipleObjectsEx
WaitNamedPipeA
WaitNamedPipeW
WriteConsoleOutputAttribute
WriteFileGather
WriteTapemark
_hwrite
_lread
lstrcmpW
lstrcpyn
GlobalUnlock
ExitProcess
user32
GetWindowWord
IMPGetIMEA
InsertMenuA
InvertRect
IsCharAlphaW
IsCharLowerW
IsCharUpperA
IsDlgButtonChecked
IsWindowEnabled
IsWindowUnicode
IsWindowVisible
KillTimer
LoadAcceleratorsA
LoadImageW
LookupIconIdFromDirectory
MapVirtualKeyA
MessageBoxIndirectA
MessageBoxIndirectW
MonitorFromRect
OpenDesktopW
OpenInputDesktop
PackDDElParam
PostThreadMessageA
PtInRect
RegisterClassExW
RegisterDeviceNotificationW
RemovePropW
ScrollWindow
SendIMEMessageExA
SetClassLongW
SetClassWord
SetDebugErrorLevel
SetMenuItemBitmaps
SetMenuItemInfoA
SetMenuItemInfoW
SetRect
SetUserObjectInformationW
SetWindowLongW
ShowCursor
ShowWindowAsync
SubtractRect
SwitchToThisWindow
TileWindows
ToAsciiEx
TrackPopupMenu
TrackPopupMenuEx
TranslateAcceleratorW
UnhookWindowsHook
UnionRect
UnloadKeyboardLayout
UnregisterClassW
VkKeyScanExW
WINNLSEnableIME
keybd_event
wsprintfW
wvsprintfA
wvsprintfW
GetWindowModuleFileNameA
GetUserObjectInformationA
GetUpdateRgn
GetSystemMetrics
GetSysColor
GetProcessWindowStation
GetNextDlgGroupItem
GetMessageW
GetMessageA
GetMenuState
GetMenuItemID
GetLastInputInfo
GetKeyboardType
GetForegroundWindow
GetFocus
GetDoubleClickTime
GetDlgItem
GetDesktopWindow
GetCursorPos
GetCursor
GetClipboardOwner
GetClassLongW
GetClassLongA
GetClassInfoW
GetClassInfoExA
GetCapture
GetAsyncKeyState
GetAltTabInfo
FreeDDElParam
FlashWindow
FindWindowExW
EnumDisplaySettingsExA
EnumDesktopWindows
EndDeferWindowPos
EnableMenuItem
DrawTextW
DrawTextExW
DrawStateW
DrawFrameControl
DragDetect
DlgDirSelectComboBoxExA
DialogBoxIndirectParamW
DialogBoxIndirectParamA
DestroyMenu
DestroyIcon
DeregisterShellHookWindow
DefFrameProcW
DefDlgProcW
DefDlgProcA
DdeUninitialize
DdeUnaccessData
DdeReconnect
DdeQueryStringW
DdeQueryStringA
DdeQueryNextServer
DdeKeepStringHandle
DdeDisconnectList
DdeDisconnect
DdeConnectList
DdeClientTransaction
DdeAddData
CreateMDIWindowW
CreateIconFromResourceEx
CreateIconFromResource
CreateDesktopA
CreateCaret
CountClipboardFormats
CopyIcon
CharToOemA
CharNextA
CharLowerBuffA
BeginDeferWindowPos
AppendMenuW
AppendMenuA
AnyPopup
AllowSetForegroundWindow
AdjustWindowRect
DlgDirSelectExW
advapi32
RegOpenKeyExA
shell32
WOWShellExecute
Shell_NotifyIconW
ShellHookProc
ShellExecuteExW
ShellExecuteExA
ShellExecuteEx
ShellAboutW
SHQueryRecycleBinW
SHQueryRecycleBinA
SHPathPrepareForWriteA
SHLoadNonloadedIconOverlayIdentifiers
SHIsFileAvailableOffline
SHGetSpecialFolderPathA
CheckEscapesW
CommandLineToArgvW
DoEnvironmentSubstA
DragAcceptFiles
DragFinish
DragQueryFile
DragQueryFileA
DragQueryFileW
DuplicateIcon
ExtractAssociatedIconA
ExtractAssociatedIconExW
ExtractAssociatedIconW
ExtractIconExA
ExtractIconExW
FindExecutableA
FindExecutableW
SHAddToRecentDocs
SHAppBarMessage
SHBindToParent
SHBrowseForFolder
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHBrowseForFolderW
SHChangeNotify
SHCreateDirectoryExA
SHCreateDirectoryExW
SHCreateProcessAsUserW
SHEmptyRecycleBinA
SHEmptyRecycleBinW
SHFileOperation
SHFileOperationW
SHFormatDrive
SHFreeNameMappings
SHGetDataFromIDListA
SHGetDataFromIDListW
SHGetDesktopFolder
SHGetDiskFreeSpaceA
SHGetDiskFreeSpaceExW
SHGetFileInfo
SHGetFolderLocation
SHGetFolderPathW
SHGetIconOverlayIndexA
SHGetIconOverlayIndexW
SHGetMalloc
SHGetPathFromIDList
SHGetPathFromIDListA
shlwapi
StrChrA
StrChrIW
StrCmpNA
StrCmpNIA
StrCmpNIW
StrRChrA
StrRChrIA
StrRChrIW
StrRChrW
StrRStrIA
StrRStrIW
StrStrA
StrStrIA
StrStrW
StrStrIW
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text5 Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text7 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text8 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ