Static task
static1
Behavioral task
behavioral1
Sample
8aafcb19a614a4b4b8d591fded819bfc_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8aafcb19a614a4b4b8d591fded819bfc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8aafcb19a614a4b4b8d591fded819bfc_JaffaCakes118
-
Size
41KB
-
MD5
8aafcb19a614a4b4b8d591fded819bfc
-
SHA1
5b313e023b7450969a618d926c898722f5efe1de
-
SHA256
b5edff7c50f8be478598873ef5cfd0e01b0e666aa918ff2796549fad096750a2
-
SHA512
8d5a515cd91c85f101754f7cda331706b91f71919a88289ec1cdfe1f253d64563c5fe54ab77d42b6526dadc83dcd1d266ffe4146f6aacfc289fefb17b62f703a
-
SSDEEP
768:g4hZ1p/ija+1IGplAAGKCT4QmLHVEKp17EjOdOKi/xYRq2RDbDJc:g4hZWaL4EU7aOdOED2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8aafcb19a614a4b4b8d591fded819bfc_JaffaCakes118
Files
-
8aafcb19a614a4b4b8d591fded819bfc_JaffaCakes118.dll windows:4 windows x86 arch:x86
d0023ffba97b1e45898ff4c05daf7d9c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
user32
GetKeyboardType
DestroyWindow
MessageBoxA
CreateWindowExA
TranslateMessage
SetWindowsHookExA
SendMessageA
ReplyMessage
RegisterClassExA
LoadIconA
LoadCursorA
GetMessageA
FindWindowA
DispatchMessageA
DestroyWindow
DefWindowProcA
CallNextHookEx
kernel32
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
GetStartupInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpA
lstrcatA
WriteProcessMemory
WriteFile
WaitForSingleObject
VirtualProtect
VirtualAllocEx
TerminateThread
TerminateProcess
SleepEx
Sleep
SetThreadContext
ResumeThread
ReleaseMutex
OpenMutexA
LoadLibraryA
GetVolumeInformationA
GetThreadContext
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetExitCodeThread
FreeLibrary
ExitThread
CreateThread
CreateProcessA
CreateMutexA
CreateFileA
CloseHandle
sockets
WSAAsyncSelect
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
socket
shutdown
send
recv
listen
inet_addr
getsockname
connect
closesocket
bind
accept
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 10KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ