Static task
static1
Behavioral task
behavioral1
Sample
8a92767cac1b0f04490b2d69ba97ecf6_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a92767cac1b0f04490b2d69ba97ecf6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8a92767cac1b0f04490b2d69ba97ecf6_JaffaCakes118
-
Size
116KB
-
MD5
8a92767cac1b0f04490b2d69ba97ecf6
-
SHA1
7a990755174fa983e18ccab52713014af191ab98
-
SHA256
d4fa1b373d073d031ab3c2f71e5d45d5a71c9da9f1b5f8ee9404e98f372f8fb1
-
SHA512
3ffa6a447142270e0b882c312f4396de58124388887ea87003814fedde2f68ca3a6aeccbd0c3ba0bc4ac3fde09f99ced9a654d7a5cb3a41f14bb8bad17a2fc8e
-
SSDEEP
1536:Xix3ZW1mlB9YlYPmUlNCdHFA0ciXA1Hlfn6Mjng0JKldzWkrfWym54ktP0rJ:Xixg1lYLgHiJJ9n6Mrg0JKlRoX54ks
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a92767cac1b0f04490b2d69ba97ecf6_JaffaCakes118
Files
-
8a92767cac1b0f04490b2d69ba97ecf6_JaffaCakes118.dll windows:4 windows x86 arch:x86
13c13d20fc242620952cd84ac5d61533
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
timeBeginPeriod
timeEndPeriod
timeKillEvent
timeSetEvent
waveInAddBuffer
waveInGetDevCapsA
waveInGetDevCapsW
mciSendCommandA
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInReset
waveInStart
waveInUnprepareHeader
waveOutClose
waveOutGetDevCapsA
waveOutGetDevCapsW
waveOutGetNumDevs
waveOutGetPosition
waveOutOpen
waveOutPrepareHeader
waveOutReset
waveOutUnprepareHeader
waveOutWrite
ole32
PropVariantClear
IsEqualGUID
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CoCreateInstance
CoInitialize
dinput
DirectInputCreateW
ws2_32
accept
socket
send
select
recv
listen
ioctlsocket
htons
WSAAsyncGetHostByName
WSACancelAsyncRequest
WSACleanup
WSAGetLastError
WSAStartup
inet_addr
bind
closesocket
connect
htonl
advapi32
SetFileSecurityW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
OpenProcessToken
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
GetAclInformation
GetAce
EqualSid
AllocateAndInitializeSid
AddAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
user32
OpenClipboard
CharLowerBuffA
CharToOemA
ClientToScreen
wsprintfA
UpdateWindow
TranslateMessage
ShowWindow
ShowCursor
SetWindowPos
SetRect
SetClipboardData
ScreenToClient
ReleaseDC
RegisterWindowMessageA
RegisterClassA
PostThreadMessageA
PeekMessageA
AdjustWindowRect
MsgWaitForMultipleObjects
MessageBoxW
LoadIconA
LoadCursorA
GetSystemMetrics
GetQueueStatus
GetForegroundWindow
GetDC
GetClipboardData
EmptyClipboard
DispatchMessageA
DestroyWindow
DefWindowProcA
CreateWindowExA
CloseClipboard
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
SetWaitableTimer
SetUnhandledExceptionFilter
SetThreadPriority
SetThreadIdealProcessor
SetThreadAffinityMask
Sleep
SetLastError
SetHandleCount
SetFileTime
SetFilePointer
SetEvent
SetEnvironmentVariableA
SetStdHandle
TerminateProcess
SetEndOfFile
TlsAlloc
RtlUnwind
ResumeThread
RemoveDirectoryW
ReleaseSemaphore
ReadFile
RaiseException
QueryPerformanceFrequency
QueryPerformanceCounter
PeekNamedPipe
OutputDebugStringA
OpenFile
OpenEventA
MultiByteToWideChar
MulDiv
MoveFileA
LoadLibraryA
LeaveCriticalSection
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrlenA
GetFullPathNameA
GetLastError
GetLocaleInfoA
SetCurrentDirectoryA
EnterCriticalSection
LCMapStringW
LCMapStringA
IsValidLocale
IsValidCodePage
IsDebuggerPresent
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
HeapFree
HeapCreate
HeapAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetUserDefaultLangID
GetUserDefaultLCID
GetTimeZoneInformation
GetTimeFormatA
GetTickCount
GetThreadPriority
GetTempPathW
GetSystemTimeAsFileTime
GetSystemInfo
GetSystemDirectoryA
GetSystemDefaultLangID
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetProcessHeap
GetOverlappedResult
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
AreFileApisANSI
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DuplicateHandle
GetFileType
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetLocaleInfoW
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ