Static task
static1
Behavioral task
behavioral1
Sample
856445a569771cb8846b0aa81073b531_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
856445a569771cb8846b0aa81073b531_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
856445a569771cb8846b0aa81073b531_JaffaCakes118
-
Size
23KB
-
MD5
856445a569771cb8846b0aa81073b531
-
SHA1
1510febaccb3d8aa2f7d87ff9d408a7e85c768c2
-
SHA256
fceb6f1fa8045281f27f3e80af5702afd80decfa88ee6459b29cdc70f93ac7c0
-
SHA512
54fd8165f21e4bc0fda3e40f71bce96668d258c272191454ca827b8eb0d2d013e21f0ca2f8690448864c476f1a95927f28bd90b75f8b8e14769ea295300e4b70
-
SSDEEP
384:gB3S8OWNLVC7ul9g+QxBp3FAbMhxygf1f4R+rs2P2RWpnI2ZqTs5h0VPF:4OWNLE7SyBpVQMhxWR++4nI2ETs5i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 856445a569771cb8846b0aa81073b531_JaffaCakes118
Files
-
856445a569771cb8846b0aa81073b531_JaffaCakes118.dll windows:4 windows x86 arch:x86
e2b865374457b0395992f5ac128d0962
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetModuleHandleA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
GetCurrentThread
Process32Next
Process32First
InitializeCriticalSection
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
IsBadReadPtr
CloseHandle
TerminateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CreateThread
GetCurrentProcessId
CreateMutexA
GetLastError
RaiseException
Sleep
CreateToolhelp32Snapshot
user32
GetForegroundWindow
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowTextA
GetWindowThreadProcessId
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
??3@YAXPAX@Z
_stricmp
_adjust_fdiv
malloc
_initterm
free
strrchr
memset
wcslen
strcmp
strcat
sprintf
strcpy
memcpy
strncpy
strchr
??2@YAPAXI@Z
strlen
sscanf
strstr
_strlwr
fclose
fread
fopen
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ