Static task
static1
Behavioral task
behavioral1
Sample
857aa981bc401eab72f68a0aa3fe5e7b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
857aa981bc401eab72f68a0aa3fe5e7b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
857aa981bc401eab72f68a0aa3fe5e7b_JaffaCakes118
-
Size
203KB
-
MD5
857aa981bc401eab72f68a0aa3fe5e7b
-
SHA1
68e611889b0df605321c73d9dd24a4b86237975a
-
SHA256
6c95af6eedb9c9620a9379888c12d2644273d3373835602b6e17803a07f5a8c3
-
SHA512
d03d1d163378a7a05cea20c2d58c49c330e50aae2c4b8d3899ebe9e94d5bcb6805df0aa3fc1eac3a534fadf3550af357d4c4b9b0c5333dd7bc5d03a06d1b658f
-
SSDEEP
6144:T6od5j7uVeHSOh4zjM98jtHrHnV3HCEewdHGs:Tl0elhOjJjHCvw3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 857aa981bc401eab72f68a0aa3fe5e7b_JaffaCakes118
Files
-
857aa981bc401eab72f68a0aa3fe5e7b_JaffaCakes118.dll windows:5 windows x86 arch:x86
ad863e097182fc823f68020a7dd2e5f7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
CreateFileA
GetWindowsDirectoryA
ExitProcess
GetProcAddress
LoadLibraryA
AddAtomW
BackupSeek
BeginUpdateResourceW
BuildCommDCBW
CopyFileA
CopyFileW
CreateDirectoryW
CreateThread
DuplicateHandle
EnumCalendarInfoW
EnumDateFormatsW
EnumLanguageGroupLocalesW
EnumResourceNamesW
FileTimeToDosDateTime
FindFirstVolumeMountPointW
FindFirstVolumeW
FindVolumeMountPointClose
FreeLibrary
FreeResource
GetAtomNameW
GetBinaryTypeA
GetCPInfo
GetCommMask
GetCommProperties
GetCompressedFileSizeW
GetConsoleAliasExesLengthA
GetConsoleAliasesA
GetConsoleFontSize
GetConsoleTitleA
GetCurrencyFormatA
GetDateFormatA
GetEnvironmentStringsA
GetLogicalDriveStringsA
GetLongPathNameW
GetOEMCP
GetPriorityClass
GetPrivateProfileSectionNamesW
GetPrivateProfileStringA
GetPrivateProfileStructW
GetProcessAffinityMask
GetProcessPriorityBoost
GetProcessShutdownParameters
GetShortPathNameA
GetShortPathNameW
GetTempFileNameA
GetVersion
GlobalDeleteAtom
GlobalFree
GlobalWire
Heap32ListNext
HeapDestroy
HeapSize
InitializeCriticalSection
IsBadStringPtrW
IsBadWritePtr
LocalReAlloc
LocalUnlock
LockResource
Module32NextW
OpenMutexA
OutputDebugStringA
Process32Next
QueryPerformanceCounter
QueueUserAPC
ReadFile
ResumeThread
RtlFillMemory
RtlUnwind
SetCommConfig
SetConsoleTitleA
SetConsoleWindowInfo
SetCriticalSectionSpinCount
SetCurrentDirectoryW
SetEnvironmentVariableW
SetLocaleInfoA
SetMailslotInfo
SetProcessPriorityBoost
SetThreadExecutionState
SetThreadIdealProcessor
SetVolumeLabelA
SetVolumeMountPointA
SignalObjectAndWait
SystemTimeToTzSpecificLocalTime
TlsAlloc
TlsGetValue
UnhandledExceptionFilter
UpdateResourceW
VirtualFreeEx
WinExec
WriteFileGather
WriteProcessMemory
_lwrite
lstrcmpA
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
user32
BroadcastSystemMessageW
BroadcastSystemMessageA
ActivateKeyboardLayout
wvsprintfW
UnpackDDElParam
TranslateAcceleratorA
CallWindowProcW
SwitchToThisWindow
SwitchDesktop
ShowScrollBar
ShowOwnedPopups
SetWindowsHookExA
SetWindowContextHelpId
SetShellWindow
SetScrollPos
SetLastErrorEx
SendMessageA
SendDlgItemMessageW
ScrollWindow
ReleaseCapture
RegisterHotKey
PtInRect
OpenWindowStationW
OpenWindowStationA
OpenInputDesktop
OpenDesktopA
OpenClipboard
MonitorFromRect
MessageBoxW
MessageBoxA
MessageBeep
LoadBitmapW
IsDialogMessageA
InflateRect
IMPSetIMEA
IMPQueryIMEW
IMPGetIMEW
GetWindowThreadProcessId
GetWindowModuleFileName
GetWindow
GetUserObjectSecurity
GetSystemMenu
GetSysColor
GetOpenClipboardWindow
ToUnicode
GetMonitorInfoW
GetMessageA
GetMenuItemID
GetMenuCheckMarkDimensions
GetLastActivePopup
GetKeyboardLayoutNameW
GetKeyboardLayoutNameA
GetForegroundWindow
GetFocus
GetComboBoxInfo
GetClipCursor
GetClassInfoExA
GetAltTabInfoA
FreeDDElParam
EnumWindows
EnumWindowStationsA
EnumDisplaySettingsW
EnumDisplaySettingsExW
EnumDesktopsW
EnumChildWindows
EndPaint
EnableWindow
EmptyClipboard
EditWndProc
DrawStateA
DrawMenuBar
DrawFrameControl
DrawEdge
DragObject
DlgDirListComboBoxA
DlgDirListA
DispatchMessageW
DialogBoxIndirectParamA
DestroyWindow
DeleteMenu
DefMDIChildProcA
DdeImpersonateClient
DdeGetLastError
DdeCreateStringHandleW
CreatePopupMenu
CreateDesktopW
ClientToScreen
CheckMenuItem
CharPrevW
ChangeDisplaySettingsExA
ole32
WriteOleStg
WriteFmtUserTypeStg
WdtpInterfacePointer_UserUnmarshal
WdtpInterfacePointer_UserFree
UtConvertDvtd16toDvtd32
StringFromCLSID
StgPropertyLengthAsVariant
StgIsStorageFile
StgCreateStorageEx
StgCreatePropSetStg
StgConvertVariantToProperty
SNB_UserUnmarshal
ReadOleStg
PropStgNameToFmtId
ProgIDFromCLSID
OleSetContainedObject
OleSetAutoConvert
OleRun
OleRegEnumFormatEtc
OleLockRunning
OleLoad
OleGetIconOfClass
OleDuplicateData
OleDraw
OleCreateStaticFromData
OleCreateLinkEx
OleCreateFromFileEx
OleCreateFromData
OleCreateEx
OleConvertOLESTREAMToIStorage
OleBuildVersion
MonikerRelativePathTo
IsEqualGUID
IIDFromString
HWND_UserFree
HPALETTE_UserUnmarshal
HMETAFILE_UserUnmarshal
HMETAFILEPICT_UserMarshal
HMENU_UserUnmarshal
HICON_UserFree
HGLOBAL_UserSize
HENHMETAFILE_UserFree
HDC_UserSize
HDC_UserFree
HBRUSH_UserFree
HACCEL_UserMarshal
GetRunningObjectTable
GetHookInterface
FmtIdToPropStgName
DoDragDrop
DcomChannelSetHResult
CreateStreamOnHGlobal
CreateObjrefMoniker
CreateFileMoniker
CreateClassMoniker
CreateAntiMoniker
CoUnloadingWOW
CoUninitialize
CoTreatAsClass
CoSuspendClassObjects
CoSetProxyBlanket
CoRegisterSurrogateEx
CoRegisterMessageFilter
CoRegisterMallocSpy
CoRegisterClassObject
CoReactivateObject
CoQueryAuthenticationServices
CoIsHandlerConnected
CoInstall
CoInitializeWOW
CoInitialize
CoImpersonateClient
CoGetTreatAsClass
CoGetStdMarshalEx
CoGetObjectContext
CoGetMalloc
CoGetInterfaceAndReleaseStream
CoGetInstanceFromIStorage
CoEnableCallCancellation
CoDosDateTimeToFileTime
CoDisableCallCancellation
CoCreateObjectInContext
CoBuildVersion
CLSIDFromProgIDEx
CLIPFORMAT_UserUnmarshal
BindMoniker
HMENU_UserMarshal
oleaut32
DosDateTimeToVariantTime
CreateTypeLib2
CreateStdDispatch
CreateDispTypeInfo
LHashValOfNameSys
LPSAFEARRAY_Unmarshal
LPSAFEARRAY_UserMarshal
LoadTypeLi
OleCreatePictureIndirect
OleLoadPictureFileEx
RegisterActiveObject
RevokeActiveObject
SafeArrayCreate
SafeArrayCreateVector
SafeArrayDestroy
SafeArrayGetLBound
SafeArrayGetRecordInfo
SafeArrayLock
SysAllocStringByteLen
SysReAllocString
SysStringLen
VARIANT_UserSize
VARIANT_UserUnmarshal
VarBoolFromUI1
VarBoolFromUI2
VarBstrCmp
VarBstrFromDate
VarBstrFromDisp
VarBstrFromR8
VarBstrFromUI4
VarCyAdd
VarCyFix
VarCyFromR4
VarCyFromR8
VarCyInt
VarCyRound
VarDateFromBool
VarDateFromI1
VarDateFromStr
VarDateFromUdateEx
VarDecAdd
VarDecDiv
VarDecFromR4
VarDecFromUI1
VarFix
VarFormatCurrency
VarFormatDateTime
VarI1FromDec
VarI1FromI2
VarI2FromBool
VarI2FromCy
VarI2FromDec
VarI2FromI1
VarI2FromI4
VarI2FromR8
VarI2FromStr
VarI2FromUI2
VarI4FromDate
VarI4FromDec
VarI4FromUI1
VarI4FromUI4
VarMod
VarNeg
VarNot
VarR4FromCy
VarR4FromI1
VarR4FromI4
VarR8FromBool
VarR8FromI4
VarR8FromR4
VarR8FromUI4
VarUI1FromBool
VarUI1FromCy
VarUI1FromDec
VarUI1FromI1
VarUI1FromI4
VarUI1FromR4
VarUI2FromDec
VarUI2FromI1
VarUI2FromI2
VarUI2FromI4
VarUI4FromBool
VarUI4FromCy
VarUI4FromI1
VarUI4FromI2
VarUI4FromUI2
VariantInit
GetErrorInfo
Sections
.text Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ