NativeWIUsb
Static task
static1
Behavioral task
behavioral1
Sample
82d6cdf60bdabd4d7bacc72803c8a269_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82d6cdf60bdabd4d7bacc72803c8a269_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
82d6cdf60bdabd4d7bacc72803c8a269_JaffaCakes118
-
Size
80KB
-
MD5
82d6cdf60bdabd4d7bacc72803c8a269
-
SHA1
a483900bbfd8ffc4a9517886c2f2deb744f328a8
-
SHA256
2e41c32b78100c9732cdd1ed2150e6211dfc111cd266bc47908a0a4f5c7b17e2
-
SHA512
7a6d6f411b9d8d7351fca1c6611affd0e5f33e0462bcbf67472305b9cd23714e0a2db06d1f6cfadeb2ff7c9b2ea54c9bf3b62d37067faf44dde907c26234b061
-
SSDEEP
1536:3J5EIM6TB+X5GcibOAISKM2ljyLRR3s8jsv:3DEgBG5GcCBpKM2lWn3Hjs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82d6cdf60bdabd4d7bacc72803c8a269_JaffaCakes118
Files
-
82d6cdf60bdabd4d7bacc72803c8a269_JaffaCakes118.dll windows:4 windows x86 arch:x86
8b6a9bc064c2f00b2649abd302d9e053
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateDirectoryA
InitializeCriticalSectionAndSpinCount
CreateFileMappingA
GetProcAddress
HeapFree
GetLastError
GetProcessHeap
GetCommandLineA
WaitForSingleObject
ReleaseMutex
lstrlenW
GetSystemTimeAsFileTime
LoadLibraryA
CloseHandle
LocalFree
GetModuleFileNameA
DeleteFileA
CreateJobObjectW
TransactNamedPipe
GetFileInformationByHandle
ExitProcess
DosDateTimeToFileTime
VirtualAlloc
FindCloseChangeNotification
ReadDirectoryChangesW
ClearCommBreak
RtlMoveMemory
ReadConsoleInputW
GlobalReAlloc
HeapUnlock
GetCompressedFileSizeW
GetFileSize
GetDiskFreeSpaceW
CreateHardLinkW
GetDriveTypeW
GetFileAttributesW
GetFileType
VerifyVersionInfoA
SetTimeZoneInformation
FindNextVolumeW
SetConsoleActiveScreenBuffer
SystemTimeToTzSpecificLocalTime
ExpandEnvironmentStringsA
GlobalFlags
SetConsoleTitleA
GetNumberOfConsoleInputEvents
GlobalFindAtomW
CancelWaitableTimer
WaitForMultipleObjects
ConvertDefaultLocale
GetUserDefaultLCID
GetTempPathW
WaitNamedPipeA
HeapReAlloc
lstrcatW
WinExec
SleepEx
lstrcpyW
GetUserDefaultUILanguage
FindClose
user32
DispatchMessageA
DefWindowProcA
CopyAcceleratorTableW
DefDlgProcA
InternalGetWindowText
GetMenuItemRect
DrawFrameControl
CreateCursor
CallMsgFilterW
UnionRect
GetFocus
EnumThreadWindows
ClientToScreen
GetWindowRgn
SendNotifyMessageA
DefDlgProcW
FreeDDElParam
GetUserObjectInformationA
EndDeferWindowPos
SendDlgItemMessageA
GetSysColor
CreateDialogIndirectParamA
FlashWindow
CharUpperBuffA
CreateAcceleratorTableW
GetWindowPlacement
GetMessageExtraInfo
SetScrollRange
GetActiveWindow
LoadCursorW
GetMonitorInfoW
BroadcastSystemMessageW
RegisterHotKey
CopyAcceleratorTableA
wvsprintfA
EnableWindow
GetTopWindow
DestroyCursor
GetClassInfoA
GetWindowTextLengthA
CreateIconIndirect
InsertMenuW
GetDlgItem
SetPropW
GetCapture
SetWindowsHookExW
GrayStringA
SetCaretPos
ExitWindowsEx
SetProcessWindowStation
SetParent
SetMenuItemBitmaps
SetMenuDefaultItem
CharNextExA
SetFocus
MapDialogRect
GetWindowThreadProcessId
RegisterClassExA
PostMessageA
KillTimer
GetMessageA
oleaut32
SysReAllocStringLen
SysStringLen
SysFreeString
SysAllocStringLen
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ