Static task
static1
Behavioral task
behavioral1
Sample
82030817463c4287960624b36322718f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82030817463c4287960624b36322718f_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
82030817463c4287960624b36322718f_JaffaCakes118
-
Size
116KB
-
MD5
82030817463c4287960624b36322718f
-
SHA1
7cc03f336fe02c00ca45ae01c6bcb131b445b506
-
SHA256
4b285388cb633fe9d8796030b1927f02961ab5987b0a150b969a28b9303c5b4d
-
SHA512
151939b6a366720f0f28507058e9db2c9da8bb647c8d5ba3fcda4a7d4c2db4e6c80f811d430dbe463808b6b6e69e4a1f9076f5e4c40b5891e3bdfd04808f55ce
-
SSDEEP
1536:0lyKWarB1R6d0yG2gsLDPaqHbPwfdCDEK6C9ZE40bmwKyKCbK7nLQJ8dtfxbh+pN:0AK96d0yG2gaPDjhX/3bPbLQJKByGax
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82030817463c4287960624b36322718f_JaffaCakes118
Files
-
82030817463c4287960624b36322718f_JaffaCakes118.dll windows:4 windows x86 arch:x86
379e51f2ab1a295411f469096403eaa3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
dinput
DirectInputCreateW
winmm
waveOutUnprepareHeader
waveOutRestart
PlaySoundW
WOW32DriverCallback
midiInStart
midiOutSetVolume
mmioInstallIOProcA
mod32Message
advapi32
GetAce
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaSetInformationTrustedDomain
LsaRemoveAccountRights
LookupPrivilegeNameW
I_ScSetServiceBitsA
GetTrusteeNameW
AddAccessDeniedAce
FileEncryptionStatusA
GetAclInformation
GetSecurityDescriptorDacl
kernel32
SetEnvironmentVariableA
SetFileTime
OpenJobObjectW
WaitForMultipleObjectsEx
lstrcmpA
TlsGetValue
ReadFile
OpenEventW
Beep
BindIoCompletionCallback
CloseHandle
CreateSemaphoreA
DeleteCriticalSection
DuplicateHandle
EnumTimeFormatsA
ExitProcess
FindAtomA
FindAtomW
FindNextVolumeW
FlushConsoleInputBuffer
FormatMessageA
GetBinaryTypeA
GetCommandLineA
GetConsoleAliasA
GetConsoleOutputCP
GetCurrentProcessId
GetFileAttributesExA
GetModuleHandleA
GetPrivateProfileSectionW
GetStringTypeExA
GetSystemDefaultLangID
GetSystemInfo
GetTempPathW
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalAddAtomA
HeapAlloc
HeapCreate
MulDiv
ole32
PropVariantClear
IsEqualGUID
shell32
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteA
user32
UpdateWindow
ShowWindow
GetTopWindow
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClassA
PeekMessageA
MessageBoxW
MsgWaitForMultipleObjects
SetSystemCursor
GetForegroundWindow
BeginDeferWindowPos
CharLowerBuffA
CharToOemA
CreateWindowExA
DefWindowProcA
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnumPropsA
GetCaretPos
GetKeyState
OpenClipboard
ws2_32
WSAGetLastError
WSCDeinstallProvider
closesocket
connect
gethostbyname
htons
socket
WSAUnhookBlockingHook
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ