dream_zerf
Static task
static1
Behavioral task
behavioral1
Sample
8413ead667e7e1a3046b13e4999b6ccf_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8413ead667e7e1a3046b13e4999b6ccf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8413ead667e7e1a3046b13e4999b6ccf_JaffaCakes118
-
Size
80KB
-
MD5
8413ead667e7e1a3046b13e4999b6ccf
-
SHA1
4b615ea646934c1f0c2b90c4641d38026d01c51f
-
SHA256
96b5c528a6f71a8c6306707c75e965cb2dfe0436f000d224a7eb8bc5869e440c
-
SHA512
66f3b7e55c5ae7bebb408b42f2a2e5bfb62680c27095020fd7883fd2752bbd84b71b8f3784878104c80d3cf360d04b396188614a905cc0c95d239b548dfbd700
-
SSDEEP
1536:tbxEQOzyYbLxx/sNhlXHlcJ/qTnJ7oCNN3cMJJmaj:tCzyYw1XF+/ArNN3chaj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8413ead667e7e1a3046b13e4999b6ccf_JaffaCakes118
Files
-
8413ead667e7e1a3046b13e4999b6ccf_JaffaCakes118.dll windows:4 windows x86 arch:x86
ec0613e527019757a8d43e77576d8aad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
CreateFileA
lstrcatA
lstrlenA
GetTempPathA
DeleteFileA
Sleep
lstrcpynA
WritePrivateProfileStringA
GetLastError
ExitThread
FreeLibrary
GetProcAddress
GlobalFree
LoadLibraryExA
GlobalAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
LoadLibraryA
GetPrivateProfileStringA
UnmapViewOfFile
MapViewOfFile
InterlockedExchange
SetFilePointer
CreateFileMappingA
GetFileTime
GetFileSize
SetFileAttributesA
GetFileAttributesA
GetLocalTime
InterlockedIncrement
MultiByteToWideChar
FindClose
lstrcmpiA
FindNextFileA
FindFirstFileA
ReadFile
GetSystemTime
VirtualAlloc
GetDriveTypeA
GetComputerNameA
WaitForSingleObject
TerminateThread
ReleaseMutex
OpenFileMappingA
GetModuleFileNameA
SetErrorMode
SetEndOfFile
CloseHandle
lstrcpyA
WaitForDebugEvent
TerminateProcess
ContinueDebugEvent
SetFileTime
GetTickCount
RtlUnwind
user32
KillTimer
CallNextHookEx
CharLowerA
CharUpperA
wsprintfA
SetTimer
UnhookWindowsHookEx
ws2_32
WSAStartup
advapi32
RegCloseKey
RegEnumKeyExA
RegDeleteValueA
RegEnumValueA
RegOpenKeyExA
RegSetValueExA
RegDeleteKeyA
msvcrt
malloc
Exports
Exports
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ