SK
Static task
static1
Behavioral task
behavioral1
Sample
84d569a73c0d9277503ae9239942aadb_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84d569a73c0d9277503ae9239942aadb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
84d569a73c0d9277503ae9239942aadb_JaffaCakes118
-
Size
24KB
-
MD5
84d569a73c0d9277503ae9239942aadb
-
SHA1
59835eb173399ff5afeee19c95deda143eeef34e
-
SHA256
668ffa840d14ec0d933ffa1ce18b3c756472f435e5ef0720e558842e92cb203c
-
SHA512
5f6918f72142a6af39b68ccfbc78b20dbc9a386d4f5f887db9a89f21830806d370cd8ebe53f5ff0dd1e843a9a9d342a4fcfc437ce11567f9260b0edcf1f25a29
-
SSDEEP
192:0ad6Bzh9jsWmHfiJ29YFr3y9q3MH+cfB:0a2t9IWwj9W3y9U8B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84d569a73c0d9277503ae9239942aadb_JaffaCakes118
Files
-
84d569a73c0d9277503ae9239942aadb_JaffaCakes118.dll windows:4 windows x86 arch:x86
876689b220e5797e17f1a7d1654c09be
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetCurrentProcess
GetProcAddress
LoadLibraryA
lstrcatA
GetCurrentProcessId
GetLocalTime
lstrcpyA
GetCurrentThreadId
user32
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
OpenDesktopA
SetThreadDesktop
SetWindowsHookExA
GetKeyboardState
ToAscii
GetActiveWindow
wsprintfA
GetWindowTextA
CallNextHookEx
msvcrt
_adjust_fdiv
malloc
_initterm
free
strlen
strcpy
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 994B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Share Size: 4KB - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ