Static task
static1
Behavioral task
behavioral1
Sample
8aeea04b4080ffef23061925c4753692_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8aeea04b4080ffef23061925c4753692_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8aeea04b4080ffef23061925c4753692_JaffaCakes118
-
Size
30KB
-
MD5
8aeea04b4080ffef23061925c4753692
-
SHA1
4afafdeb0be3742b6e14ea4b429949e4674c3439
-
SHA256
4ec542ce0a8bcacb6a3e732e55697601f12f0bcd348bbe26af8d76c786c9ebeb
-
SHA512
eb80a8b4abb2ef6c28ab14d6bfa53087f9bf62b60a86605f342f452f65d1fc8b8c8f9003a4626bae56c938deff6fcd43f08d073e1425bee83dee85166b051a65
-
SSDEEP
384:LyfXYGPKLvM1TunFXg666HmH14wawlp5dv7zoahf5/3B4z9MPTKCR9LuBBQARQkK:LyfXYGCd4VLVl/wC2BBQARQkVX7Ve
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8aeea04b4080ffef23061925c4753692_JaffaCakes118
Files
-
8aeea04b4080ffef23061925c4753692_JaffaCakes118.dll windows:4 windows x86 arch:x86
d96b43c56d8e0fab8cd69126339b5b8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
sscanf
strstr
RtlDeleteElementGenericTable
RtlNumberGenericTableElements
RtlGetElementGenericTable
RtlInitializeGenericTable
RtlInsertElementGenericTable
strlen
memcpy
memcmp
RtlZeroMemory
RtlUnwind
ws2_32
closesocket
gethostname
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
kernel32
UnmapViewOfFile
MapViewOfFile
IsBadReadPtr
CreateFileMappingA
GetPrivateProfileStringA
lstrcmpA
TerminateThread
Sleep
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateThread
lstrlenA
lstrcpyA
lstrcmpiA
GlobalAlloc
GlobalFree
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
GetCurrentProcessId
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
LoadLibraryA
MoveFileExA
ReadFile
lstrcatA
VirtualFree
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
WriteFile
VirtualAlloc
user32
UnhookWindowsHookEx
SetWindowsHookExA
SetTimer
SendMessageA
RegisterWindowMessageA
KillTimer
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ole32
StringFromGUID2
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ