Static task
static1
Behavioral task
behavioral1
Sample
8a8bcf50c4aa01fa8afc4e0e629d5222_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a8bcf50c4aa01fa8afc4e0e629d5222_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8a8bcf50c4aa01fa8afc4e0e629d5222_JaffaCakes118
-
Size
28KB
-
MD5
8a8bcf50c4aa01fa8afc4e0e629d5222
-
SHA1
7ef2f962479b134cd67d058fc2b0994f80910f07
-
SHA256
3c40b8db169233262adc8595835592535982b711ea2d6a5a07b8bd56c21c4b23
-
SHA512
d8109a7c84b0f6d98ab2da10a91674d29a5cc53814f0f1ed192c934473137bee4505273fd4efb5586d18e4a01fd7af4e701e2a0159591e29497c7a673e5c76ea
-
SSDEEP
192:mVesCuExYB4SA4h8E7uKT6oChVLVsjnZrLZxCZhwsT9NgdM3ShoMdLsIMEdWo+rP:mVesCuGO4S9pdChV2pDOh7rVID5+rQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a8bcf50c4aa01fa8afc4e0e629d5222_JaffaCakes118
Files
-
8a8bcf50c4aa01fa8afc4e0e629d5222_JaffaCakes118.dll windows:4 windows x86 arch:x86
45a3c78974c6850dee1da2fef9326321
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
MapVirtualKeyA
ToAscii
msvcrt
_itoa
_adjust_fdiv
malloc
_initterm
free
strchr
strcmp
atoi
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
fopen
fwrite
fclose
fread
time
memset
_strlwr
kernel32
WriteProcessMemory
Sleep
InitializeCriticalSection
CreateThread
LoadLibraryA
CopyFileA
GetModuleFileNameA
GetTempPathA
GetModuleHandleA
GetProcAddress
EnterCriticalSection
lstrcmpA
lstrcpyA
LeaveCriticalSection
lstrlenA
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
TerminateProcess
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ