Static task
static1
Behavioral task
behavioral1
Sample
87935ec4389db3819c8f57db77b03a79_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87935ec4389db3819c8f57db77b03a79_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
87935ec4389db3819c8f57db77b03a79_JaffaCakes118
-
Size
40KB
-
MD5
87935ec4389db3819c8f57db77b03a79
-
SHA1
1e9bab7a927d807fe078cde6cd9d6ea70c3398c3
-
SHA256
5e241297630f7e0352482943a8b2af4bb328d769d80a12c4a774d381031c9658
-
SHA512
44c91154922a38d727bca503e5e7cd1cf9efc7c9ad6ac3b276aa12ed1fe966247e1df731ad55cf5e2c7915bfe1dcf8a45392a671e6be9e34248c2e4148020c93
-
SSDEEP
384:gSBa1Y3br03b3vwY9vHvOkyQIEhXTEsKWk:gpa037wYoEhDvKj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87935ec4389db3819c8f57db77b03a79_JaffaCakes118
Files
-
87935ec4389db3819c8f57db77b03a79_JaffaCakes118.dll windows:4 windows x86 arch:x86
8fe59aad9bf67cd6c37f5dd78207b2cc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
AddAtomA
CreateThread
DisableThreadLibraryCalls
FindAtomA
GetAtomNameA
GetModuleHandleA
Sleep
VirtualProtect
msvcrt
__dllonexit
_errno
_iob
abort
fflush
fprintf
free
malloc
memmove
user32
GetAsyncKeyState
MessageBeep
MessageBoxA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE