Static task
static1
Behavioral task
behavioral1
Sample
887e49b9692e01e3fdc84f239d18d70c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
887e49b9692e01e3fdc84f239d18d70c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
887e49b9692e01e3fdc84f239d18d70c_JaffaCakes118
-
Size
452KB
-
MD5
887e49b9692e01e3fdc84f239d18d70c
-
SHA1
ba0026f7428e3e8bed3257a7bf6c79391469e03c
-
SHA256
1745f0b9a5ad93c15bd1551a0069166f82860dcdd49c5818f26eff3b74f3b3f4
-
SHA512
faaa4fb98b9bab33ad4e484d51bd16bc0356ed13a3135c5c94a7fe0d4e9ea11109e6b79d7159b16e08cb47d8eb5f3ed67c322a26980a3f15a16f70a29f976aab
-
SSDEEP
6144:l4UV9NcFtcGHqPcHYOE5ToyDKzqObrHGiwox0VW1/FVs1q6JFVAGA/QhimE2A1Uh:ROFCNcEKbrmiHqQstGiyT56
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 887e49b9692e01e3fdc84f239d18d70c_JaffaCakes118
Files
-
887e49b9692e01e3fdc84f239d18d70c_JaffaCakes118.dll windows:4 windows x86 arch:x86
d33a2b3e484928355f318372192e8418
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
HeapAlloc
ExitProcess
RtlUnwind
ExitThread
CreateThread
GetSystemTimeAsFileTime
GetCommandLineA
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetModuleFileNameA
UnhandledExceptionFilter
GetTimeZoneInformation
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedIncrement
GlobalFlags
RaiseException
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
GetFileTime
GetFileAttributesW
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
lstrcmpiW
InterlockedDecrement
GetLastError
SetLastError
MulDiv
lstrcpyW
GlobalAlloc
FormatMessageW
LocalFree
lstrcpynW
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
lstrlenA
GetModuleHandleA
LoadLibraryA
FreeLibrary
lstrcatW
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
lstrlenW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetModuleFileNameW
GetVersionExW
TryEnterCriticalSection
VirtualProtectEx
GetCurrentProcessId
GetLocalTime
VirtualQueryEx
GetProcAddress
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
ReadFile
CreateFileA
DeviceIoControl
CreateFileW
GetFileSize
SetFilePointer
SetEndOfFile
WriteFile
WideCharToMultiByte
MultiByteToWideChar
Beep
WriteProcessMemory
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
TerminateThread
CloseHandle
FindFirstFileW
FindNextFileW
FindClose
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetModuleHandleW
FindResourceW
LoadResource
LockResource
SizeofResource
GetTickCount
ReadProcessMemory
Sleep
GetCurrentProcess
GetStdHandle
TerminateProcess
VirtualProtect
ExitProcess
user32
PostQuitMessage
DestroyMenu
CharUpperW
EndPaint
BeginPaint
GrayStringW
DrawTextExW
TabbedTextOutW
wsprintfW
SetMenuItemBitmaps
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
MoveWindow
IsDialogMessageW
RegisterWindowMessageW
WinHelpW
GetCapture
GetClassLongW
SendDlgItemMessageW
SendDlgItemMessageA
SetFocus
GetWindowTextLengthW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageW
GetSubMenu
GetMenuItemCount
AdjustWindowRectEx
ScreenToClient
GetClassInfoW
GetDlgCtrlID
DefWindowProcW
SetWindowPos
SystemParametersInfoA
GetWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
DrawFocusRect
WindowFromPoint
ClientToScreen
OffsetRect
DrawStateW
KillTimer
GetDC
InvalidateRect
CopyRect
UnionRect
SetRectEmpty
GetSysColor
MessageBoxA
LoadCursorW
WaitForInputIdle
EnumWindows
SetWindowsHookExW
GetCursorPos
SendInput
SetWindowRgn
ShowWindow
CallWindowProcW
RegisterHotKey
UnregisterHotKey
GetWindowDC
DrawTextW
ReleaseDC
SetWindowLongW
RemovePropW
TrackMouseEvent
FillRect
SetPropW
CallNextHookEx
IsWindowVisible
LoadMenuW
LoadBitmapW
PtInRect
GetDesktopWindow
GetClassNameA
GetWindowThreadProcessId
SetTimer
MessageBoxW
GetWindowRect
GetMenuStringW
AppendMenuW
CreatePopupMenu
GetParent
GetClassInfoExW
RegisterClassExW
GetWindowLongW
GetWindowPlacement
CreateWindowExW
DestroyWindow
GetSysColorBrush
GetMessageW
TranslateMessage
GetMenuItemID
ValidateRect
ExitWindowsEx
GetPropW
UnregisterClassW
LoadImageW
GetDlgItem
GetSystemMetrics
IsWindow
LoadIconW
GetClientRect
IsIconic
DrawIcon
InflateRect
SetRect
SetCursor
GetClassNameW
EnumChildWindows
GetWindowTextA
SetWindowTextA
GetWindowTextW
SetWindowTextW
GetKeyState
EnableWindow
GetFocus
SendMessageW
RegisterClassW
gdi32
GetStockObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutW
RectVisible
PtVisible
CreatePen
RoundRect
Rectangle
Ellipse
GetTextExtentPoint32W
Polygon
GetTextColor
GetBkColor
GetDeviceCaps
ExtTextOutW
SetBkMode
SetStretchBltMode
CreateCompatibleDC
SelectObject
StretchBlt
DeleteDC
MoveToEx
LineTo
CreateFontIndirectW
DeleteObject
CombineRgn
CreateEllipticRgnIndirect
CreateRectRgnIndirect
GetObjectW
CreateSolidBrush
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegEnumKeyW
RegQueryValueW
RegCreateKeyExW
AdjustTokenPrivileges
RegSetValueExW
comctl32
ImageList_Draw
_TrackMouseEvent
ord17
ImageList_Destroy
shlwapi
PathIsUNCW
PathFindExtensionW
PathStripToRootW
PathFindFileNameW
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
ntohs
socket
inet_addr
connect
closesocket
WSAIoctl
send
recv
shutdown
htons
winmm
PlaySoundW
iphlpapi
GetAdaptersInfo
Sections
.text Size: - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text2 Size: 428KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ