SetHook
Static task
static1
Behavioral task
behavioral1
Sample
821cf80fd50f3833f5dd9322292d8343_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
821cf80fd50f3833f5dd9322292d8343_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
821cf80fd50f3833f5dd9322292d8343_JaffaCakes118
-
Size
5KB
-
MD5
821cf80fd50f3833f5dd9322292d8343
-
SHA1
e5521862132f62fc5cf6b3dcf5f3208cad6cd123
-
SHA256
2228c65b920692d724265ac1961f25864a2dcbc92241086da3ee3333d38e51aa
-
SHA512
c97f32ed641e859883bdaf7a6c854e16c74034ad59fc702a7256865372a88374fe9406870906e98204bbd8d02d9f52098c6459cc8c3b5901e211508ea35c4495
-
SSDEEP
96:xBq7fbszrI5DlCM8W+NTFF9kXv/JayYCZ2lZm/vch67:nmCK/z+p9Ugy2Zm/v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 821cf80fd50f3833f5dd9322292d8343_JaffaCakes118
Files
-
821cf80fd50f3833f5dd9322292d8343_JaffaCakes118.dll windows:4 windows x86 arch:x86
4d529ebc683b8752e64134e078a83b79
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtect
lstrcmpiA
lstrlenW
lstrcpyW
CloseHandle
Module32Next
OutputDebugStringA
GetCurrentProcess
CreateToolhelp32Snapshot
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
RtlUnwind
InterlockedExchange
VirtualQuery
Module32First
WriteProcessMemory
user32
CallNextHookEx
wsprintfA
SetWindowsHookExA
advapi32
RegOpenKeyExW
Exports
Exports
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shr Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ