Behavioral task
behavioral1
Sample
84e24586cc250f3a2ec92d4a7c084213_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
84e24586cc250f3a2ec92d4a7c084213_JaffaCakes118
-
Size
339KB
-
MD5
84e24586cc250f3a2ec92d4a7c084213
-
SHA1
bb1546051de5baf939773117663713b0e9c4651f
-
SHA256
90b06283a0ae3441f154478fa66dc0024b0cd205aa776eae62974e0227c55c6a
-
SHA512
d66c8375f193f15870daf9b3437df35e41ef465cc48de0e4b6252f541cf726874877567330a99e7a978cb36c8264e954822997ea43c4ee02753df696ea319401
-
SSDEEP
6144:WEHzI4vYxBgjCvJwPNtkdtRSO4Z0zFQrwtQHxw9sdf3M:7vYPg6J6NO4O4UFQHHxLdf
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84e24586cc250f3a2ec92d4a7c084213_JaffaCakes118
Files
-
84e24586cc250f3a2ec92d4a7c084213_JaffaCakes118.dll windows:5 windows x86 arch:x86
bdf7bb2f8bf1064385a575de40097b30
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
atoi
wcsrchr
strstr
strrchr
srand
rand
strlen
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
memcpy
_except_handler3
shlwapi
SHDeleteKeyA
PathFileExistsA
SHSetValueA
SHGetValueA
SHDeleteValueA
ws2_32
WSAEventSelect
shutdown
recv
connect
WSAStartup
htonl
htons
setsockopt
sendto
inet_addr
socket
closesocket
send
bind
WSARecvFrom
WSAGetLastError
inet_ntoa
gethostname
WSACleanup
WSACreateEvent
gethostbyname
WSAResetEvent
iphlpapi
GetAdaptersInfo
wintrust
WinVerifyTrust
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCloseEnum
WNetAddConnection2A
WNetCancelConnection2A
rpcrt4
UuidFromStringA
UuidToStringA
kernel32
FlushViewOfFile
GetExitCodeThread
RemoveDirectoryA
SetFileAttributesA
GlobalAlloc
GlobalFree
GetLocalTime
TerminateProcess
TransactNamedPipe
FindNextFileA
MoveFileExA
LockResource
WaitForMultipleObjects
FindClose
GetLogicalDriveStringsA
FindFirstFileA
lstrcpynA
WinExec
CreateDirectoryA
GetFileAttributesA
ExitProcess
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
VirtualQuery
SetEndOfFile
FreeLibrary
WaitForSingleObject
SetEvent
VirtualFree
WriteFile
OpenProcess
Sleep
CreateEventA
ReadFile
GetSystemDirectoryA
ExitThread
MultiByteToWideChar
GetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
GetTempPathA
DeleteFileA
FindResourceA
FreeResource
LoadResource
Process32First
GetSystemTimeAsFileTime
SetFileTime
GetDriveTypeA
SizeofResource
GetExitCodeProcess
CreateProcessA
lstrcatA
Process32Next
CreateFileMappingA
DeviceIoControl
SetNamedPipeHandleState
LoadLibraryExA
CreateToolhelp32Snapshot
GetFileTime
GetVersionExA
LocalFree
lstrcpyA
ConnectNamedPipe
TerminateThread
Thread32Next
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
OpenThread
GetCurrentProcess
GetVolumeInformationA
lstrlenW
lstrcmpiW
VirtualProtect
lstrcpyW
CreateThread
GetTickCount
MapViewOfFile
UnmapViewOfFile
CopyFileA
GetLogicalDrives
user32
OpenWindowStationA
SetThreadDesktop
SetProcessWindowStation
UnloadKeyboardLayout
GetMessageA
PostThreadMessageA
wsprintfA
wsprintfW
GetInputState
PostMessageA
OpenDesktopA
LoadKeyboardLayoutA
FindWindowA
advapi32
DeleteService
CloseServiceHandle
OpenProcessToken
GetTokenInformation
RegSetValueExA
RegQueryValueExA
CreateServiceA
StartServiceA
RegCreateKeyExA
RegOpenKeyExA
QueryServiceStatus
RegDeleteValueA
DuplicateTokenEx
CreateProcessAsUserA
RegSetValueExW
AdjustTokenPrivileges
RegFlushKey
RegSaveKeyA
LookupPrivilegeValueA
RegQueryValueExW
RegRestoreKeyA
OpenServiceA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
RegOpenKeyA
ControlService
OpenSCManagerA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE