Static task
static1
Behavioral task
behavioral1
Sample
857ac22db4ebf0d8d2c6fdb57a834a8c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
857ac22db4ebf0d8d2c6fdb57a834a8c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
857ac22db4ebf0d8d2c6fdb57a834a8c_JaffaCakes118
-
Size
124KB
-
MD5
857ac22db4ebf0d8d2c6fdb57a834a8c
-
SHA1
b735e8b19e63c5fc657a38958b54f7f443670fa8
-
SHA256
420e13a5915f5a485785f7ea3b946c9d64c22f1b020fd2fbd0478f01e1069c68
-
SHA512
5cd82bc85dd26b8bba2c29a1df783e7d56b7b48f2702604292cc271c58a36ceb444c97a8feef0d2304ee4cc79ed17b894548e04bfdb4f9d5f93a90a4a3d459c9
-
SSDEEP
3072:hGVzqRrIWeH1wl2VUH6qbkTpWN0U613g0JslR1iqLy:hG6Hdw6iT9UQgJ/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 857ac22db4ebf0d8d2c6fdb57a834a8c_JaffaCakes118
Files
-
857ac22db4ebf0d8d2c6fdb57a834a8c_JaffaCakes118.dll windows:4 windows x86 arch:x86
76ddcbb18330cd6559062a25d6a3dd30
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutPrepareHeader
waveOutOpen
waveOutGetPosition
waveOutGetNumDevs
waveOutGetDevCapsW
waveOutGetDevCapsA
waveOutClose
waveInUnprepareHeader
waveInStart
waveInReset
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInGetDevCapsW
waveInGetDevCapsA
waveInAddBuffer
timeSetEvent
timeKillEvent
timeEndPeriod
timeBeginPeriod
mciSendCommandA
advapi32
InitializeSecurityDescriptor
AddAce
SetSecurityDescriptorDacl
SetFileSecurityW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
OpenProcessToken
AddAccessAllowedAce
InitializeAcl
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
GetAclInformation
GetAce
EqualSid
AllocateAndInitializeSid
user32
AdjustWindowRect
CharLowerBuffA
CharToOemA
ClientToScreen
wsprintfA
UpdateWindow
TranslateMessage
ShowWindow
ShowCursor
SetWindowPos
SetRect
SetClipboardData
ScreenToClient
ReleaseDC
RegisterWindowMessageA
RegisterClassA
PostThreadMessageA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
LoadIconA
LoadCursorA
GetSystemMetrics
GetQueueStatus
GetForegroundWindow
GetDC
GetClipboardData
EmptyClipboard
DispatchMessageA
DestroyWindow
DefWindowProcA
CreateWindowExA
CloseClipboard
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
ws2_32
socket
send
select
recv
listen
ioctlsocket
inet_addr
htons
htonl
connect
closesocket
bind
accept
WSAStartup
WSAGetLastError
WSACleanup
WSACancelAsyncRequest
WSAAsyncGetHostByName
dinput
DirectInputCreateW
kernel32
RaiseException
QueryPerformanceFrequency
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
RemoveDirectoryW
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetStdHandle
SetThreadAffinityMask
SetThreadIdealProcessor
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
PeekNamedPipe
OutputDebugStringA
OpenFile
OpenEventA
MultiByteToWideChar
MulDiv
MoveFileA
TerminateProcess
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsValidLocale
IsValidCodePage
IsDebuggerPresent
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
HeapFree
HeapCreate
HeapAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetUserDefaultLangID
GetUserDefaultLCID
GetTimeZoneInformation
GetTimeFormatA
GetTickCount
GetThreadPriority
GetTempPathW
GetSystemTimeAsFileTime
GetSystemInfo
GetSystemDirectoryA
GetSystemDefaultLangID
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetProcessHeap
lstrlenA
WriteFile
WriteConsoleW
WriteConsoleA
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
TryEnterCriticalSection
TlsSetValue
TlsGetValue
TlsFree
LoadLibraryA
FindNextFileA
AreFileApisANSI
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
GetOverlappedResult
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
TlsAlloc
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
ole32
CLSIDFromString
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
IsEqualGUID
PropVariantClear
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ