Static task
static1
Behavioral task
behavioral1
Sample
8bbc2212d40c5037746c379d48f16b06_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8bbc2212d40c5037746c379d48f16b06_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8bbc2212d40c5037746c379d48f16b06_JaffaCakes118
-
Size
40KB
-
MD5
8bbc2212d40c5037746c379d48f16b06
-
SHA1
36d8dd5a9d85edfdd2fecabc56d9a18c58eb2bb7
-
SHA256
f170f3716e362dbb202aa90745e4c0f10f1d4262d82b7222bf421e64946a5914
-
SHA512
a2e94b64d2923fd76ba60805038bd99f707c8cad8d016c4d07340489c72596c2c62397aede54982797706e9cae51976ba0f9839439afb5f65dddbab2f8eb9d4f
-
SSDEEP
768:cmGw1a0Qr0hXyxj6z+TQYQNW4zws6Vpra:cdwHKo+vQs4zwP2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bbc2212d40c5037746c379d48f16b06_JaffaCakes118
Files
-
8bbc2212d40c5037746c379d48f16b06_JaffaCakes118.dll windows:4 windows x86 arch:x86
522cdf438a99629fd54bcdbc617f0061
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalMemoryStatus
GetComputerNameA
CreateEventA
ResetEvent
TerminateThread
ExitThread
WinExec
FindNextFileA
GetLastError
FindClose
FindFirstFileA
SetCurrentDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetDriveTypeA
GetTempFileNameA
GetTempPathA
RemoveDirectoryA
GetCurrentDirectoryA
GetWindowsDirectoryA
TerminateProcess
OpenProcess
VirtualProtectEx
GetModuleFileNameA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetSystemInfo
GetVersionExA
GetProcessHeap
LoadLibraryA
GetProcAddress
HeapAlloc
HeapFree
CreateThread
Sleep
SetConsoleCtrlHandler
GetModuleHandleA
GetLocalTime
SetFilePointer
GetFileSize
SetEvent
GetCurrentThreadId
GetFileTime
WriteFile
SetFileTime
CreateFileA
ReadFile
GetSystemDirectoryA
CopyFileA
CreateProcessA
WaitForSingleObject
CloseHandle
MoveFileA
DeleteFileA
user32
SetCursorPos
keybd_event
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
GetKeyState
PostThreadMessageA
GetKeyNameTextA
GetWindowTextA
GetForegroundWindow
CallNextHookEx
mouse_event
SetTimer
GetDC
ReleaseDC
KillTimer
CloseWindowStation
CloseDesktop
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
SetWindowsHookExA
gdi32
LineTo
MoveToEx
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
CreateDCA
GetDeviceCaps
DeleteObject
CreatePen
DeleteDC
advapi32
AdjustTokenPrivileges
ControlService
LookupPrivilegeValueA
OpenProcessToken
StartServiceA
ChangeServiceConfigA
OpenServiceA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
GetUserNameA
RegOpenKeyExA
DeleteService
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
send
WSAStartup
gethostbyname
htons
WSASocketA
connect
closesocket
select
recv
urlmon
URLDownloadToFileA
msvcrt
??3@YAXPAX@Z
memcpy
memset
??2@YAPAXI@Z
atoi
strcpy
_strupr
strstr
strcat
strlen
__CxxFrameHandler
strcmp
memcmp
wcslen
free
_initterm
malloc
_adjust_fdiv
_itoa
_wcsupr
sprintf
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ