Static task
static1
Behavioral task
behavioral1
Sample
8bc9b1bc90c549040275cd50ed218caf_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8bc9b1bc90c549040275cd50ed218caf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8bc9b1bc90c549040275cd50ed218caf_JaffaCakes118
-
Size
25KB
-
MD5
8bc9b1bc90c549040275cd50ed218caf
-
SHA1
b21700f6295a22fe77fdb6da01df4d750468a466
-
SHA256
d016afaff7e59a1a56ecf2b3a9ee5a931a6f6d55fcd8cf466590fcf775ac56f5
-
SHA512
e9a2a52275b268aacf1cec3808e09cd808970edae0fe4ddb447cf22364c95829d4a51b8c630d814adca8a6f15139232fd11c331ac42c7aa4a400f36f7c7d20ea
-
SSDEEP
384:Zf8QYW8vIPYoCiPJ0mVevoAHh5rriIEfYDv3gL2MbY0Biflvdu:ZTCa0STAHhNiuDmLBau
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bc9b1bc90c549040275cd50ed218caf_JaffaCakes118
Files
-
8bc9b1bc90c549040275cd50ed218caf_JaffaCakes118.dll windows:4 windows x86 arch:x86
addda759cf5453fb0a953414508ec87f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalFree
GlobalUnlock
IsBadReadPtr
CloseHandle
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
MultiByteToWideChar
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
WriteProcessMemory
WideCharToMultiByte
Sleep
GlobalAlloc
GlobalLock
ReadProcessMemory
CreateThread
GetCurrentProcess
GetCurrentThreadId
VirtualProtectEx
TerminateThread
GetCurrentProcessId
GetLastError
CreateMutexA
GetCurrentThread
user32
GetForegroundWindow
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
GetWindowTextA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
msvcrt
fclose
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strrchr
wcslen
sscanf
strcat
sprintf
strcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strlen
memcpy
strncpy
strchr
strstr
_strnicmp
fread
fopen
memset
strcmp
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ