CvtEventTime
Static task
static1
Behavioral task
behavioral1
Sample
832c1e9fff432e725d207b5ac55c4085_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
832c1e9fff432e725d207b5ac55c4085_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
832c1e9fff432e725d207b5ac55c4085_JaffaCakes118
-
Size
84KB
-
MD5
832c1e9fff432e725d207b5ac55c4085
-
SHA1
c2e56c8911244d2e7266a9bf2a8248201a33f7b6
-
SHA256
b056f790639a4502dbeadd4a2b0fcf70aabb819ea671e1cfb75c8dfc88055c9e
-
SHA512
89d556bcb2ab1fdf0808d6cb2d33cb36b406a93610a2545be10159fe747da6b10f21801fea7520776a6caf05f20c9d85dd949e911ec9dac7f0c42cdb24814d73
-
SSDEEP
1536:46VSF8gU0c4rZogUBHE/cH39zSFnxTkRhafMv:FUegAKZFU2/c4n2bqMv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 832c1e9fff432e725d207b5ac55c4085_JaffaCakes118
Files
-
832c1e9fff432e725d207b5ac55c4085_JaffaCakes118.dll windows:4 windows x86 arch:x86
c3d468a96aa01bc156f127e5a3ae73a2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VerifyVersionInfoW
ChangeTimerQueueTimer
UnlockFileEx
HeapDestroy
GetVersion
GetFileAttributesExA
DeleteTimerQueueTimer
FindAtomW
GetProfileIntW
GetLocalTime
SetNamedPipeHandleState
VirtualQueryEx
CancelWaitableTimer
lstrcpyA
GetLogicalDriveStringsA
ReadProcessMemory
WaitNamedPipeW
GetDiskFreeSpaceA
GetModuleFileNameW
CreateNamedPipeW
RtlUnwind
CreateEventW
CreateActCtxW
GetProfileIntA
CreateConsoleScreenBuffer
FileTimeToLocalFileTime
GetLargestConsoleWindowSize
IsBadStringPtrA
AddRefActCtx
CreateProcessW
GetCompressedFileSizeW
DeleteFileW
GetNumberFormatA
DnsHostnameToComputerNameW
LoadResource
GetVersionExA
IsBadReadPtr
FlushFileBuffers
GetTempFileNameA
OpenEventW
FormatMessageW
FindVolumeMountPointClose
HeapCompact
lstrcatW
GetFileAttributesA
GetLogicalDrives
LCMapStringA
CreateFileMappingA
InterlockedIncrement
InterlockedExchange
GetProcAddress
GetSystemDirectoryA
InterlockedDecrement
CreateDirectoryA
WaitForSingleObject
LoadLibraryA
VirtualQuery
GetModuleHandleA
HeapFree
SetConsoleTextAttribute
EnterCriticalSection
user32
InsertMenuA
SetProcessWindowStation
SetCursorPos
wvsprintfW
CreateAcceleratorTableW
SetMenuItemInfoW
FreeDDElParam
MessageBoxIndirectA
SendDlgItemMessageA
DrawTextW
GetDlgItemTextA
DeferWindowPos
SetCursor
UnpackDDElParam
GetMonitorInfoA
SetWindowTextW
GetClassInfoW
GetMenuState
ShowWindow
BeginDeferWindowPos
MessageBoxA
wsprintfW
SetClassLongA
UnionRect
EnumThreadWindows
UnregisterHotKey
IsDialogMessageA
IsIconic
TrackMouseEvent
CharNextW
FindWindowW
DrawTextA
SetRect
MessageBoxExW
OffsetRect
ExitWindowsEx
DefMDIChildProcA
WindowFromDC
ScrollDC
LoadImageW
GetGUIThreadInfo
EndTask
VkKeyScanA
ShowCursor
InvertRect
GetProcessDefaultLayout
CreateDialogIndirectParamW
HideCaret
TranslateAcceleratorW
IsRectEmpty
GetWindowTextLengthW
RegisterClassExA
DispatchMessageA
CallNextHookEx
SetTimer
RegisterWindowMessageA
UnhookWindowsHookEx
GetDlgCtrlID
oleaut32
SysFreeString
SysAllocStringLen
SysAllocString
advapi32
RevertToSelf
EnumServicesStatusExW
RegisterEventSourceA
BuildExplicitAccessWithNameW
RegEnumKeyA
ElfRegisterEventSourceW
RegEnumValueW
RegCreateKeyW
ClearEventLogW
CredIsMarshaledCredentialW
RegisterServiceCtrlHandlerExA
RegOpenKeyW
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegisterEventSourceW
shell32
SHGetFolderPathAndSubDirW
ExtractIconA
SHAppBarMessage
ShellExecuteA
SHGetSpecialFolderPathW
SHGetPathFromIDListA
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ