Static task
static1
Behavioral task
behavioral1
Sample
8dd84192b5123258f3b3b7cc79df851d_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8dd84192b5123258f3b3b7cc79df851d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8dd84192b5123258f3b3b7cc79df851d_JaffaCakes118
-
Size
114KB
-
MD5
8dd84192b5123258f3b3b7cc79df851d
-
SHA1
7744386f191474869d67c5af5da2c21c7fd7a64f
-
SHA256
5cc67b3ccb06efda852dde903a74beb5ff0ff704dab9ce618ba351c65403e8a0
-
SHA512
3ed3a249385715f24f04d176fe181572df8a34ac3cda462edda4caf0e1a2893db52d258497b9856fcf583520cc29a5ed965cf55dbd403e35fea94cf01fdf7530
-
SSDEEP
1536:Qnmf2UTdpJ8JTy4BU/Ylzl0pZHvwBu/twocVMDSCg9wS:Qnm+o7qJTk/YlzQZPwBu2LmDJsl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dd84192b5123258f3b3b7cc79df851d_JaffaCakes118
Files
-
8dd84192b5123258f3b3b7cc79df851d_JaffaCakes118.dll windows:4 windows x86 arch:x86
e40750aa1e2255b6a00cf49c3ad2eea1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
OpenDesktopA
wsprintfA
ShowWindow
SetCursorPos
BringWindowToTop
UpdateWindow
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
PostMessageA
DispatchMessageA
GetMessageA
DestroyWindow
SendMessageA
IsWindow
PostThreadMessageA
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
CreateDesktopA
SetProcessWindowStation
SetThreadDesktop
OpenWindowStationA
GetForegroundWindow
SetWindowsHookExW
EnumChildWindows
GetUserObjectInformationA
GetActiveWindow
MessageBoxA
ExitWindowsEx
SendInput
GetThreadDesktop
OpenInputDesktop
CharUpperA
gdi32
GetDIBits
GetDeviceCaps
CreateDCA
CreateCompatibleDC
SelectObject
DeleteObject
CreateCompatibleBitmap
DeleteDC
BitBlt
advapi32
LookupPrivilegeValueA
OpenProcessToken
ImpersonateSelf
OpenThreadToken
RegCreateKeyExA
ChangeServiceConfigA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegQueryValueExA
CreateServiceA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
QueryServiceConfigA
EnumServicesStatusA
DeleteService
StartServiceA
ControlService
OpenSCManagerA
OpenServiceA
CloseServiceHandle
AdjustTokenPrivileges
shell32
SHFileOperationA
SHEmptyRecycleBinA
ShellExecuteA
ole32
CreateStreamOnHGlobal
ws2_32
accept
listen
ntohs
bind
recv
connect
getsockname
htons
select
send
WSASocketA
WSADuplicateSocketA
WSAStartup
inet_addr
gethostbyname
inet_ntoa
closesocket
setsockopt
socket
shlwapi
StrCmpW
StrCmpNIA
StrToIntA
SHDeleteKeyA
StrChrA
StrStrA
StrRChrA
psapi
GetModuleFileNameExA
EnumProcesses
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
HttpQueryInfoA
imm32
ImmReleaseContext
ImmGetCompositionStringW
ImmGetContext
ImmGetCompositionStringA
msvcrt
_beginthread
__CxxFrameHandler
free
wcscmp
malloc
strchr
strstr
??3@YAXPAX@Z
_adjust_fdiv
_initterm
??2@YAPAXI@Z
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
winmm
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInClose
waveInUnprepareHeader
waveInStop
waveInStart
kernel32
SetThreadPriority
SetPriorityClass
GetThreadPriority
GetCurrentThread
GetPriorityClass
SetFilePointer
FlushFileBuffers
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
lstrcatA
OpenEventA
CallNamedPipeA
GetStartupInfoA
GetModuleFileNameA
GetSystemDirectoryA
GetLocalTime
WideCharToMultiByte
lstrlenW
ExitProcess
GetFileAttributesA
CreateThread
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
GlobalMemoryStatus
GetComputerNameA
GetACP
GetSystemInfo
DeviceIoControl
CreateProcessA
GetStdHandle
CreatePipe
SetStdHandle
DuplicateHandle
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
GetCurrentProcessId
lstrcmpiA
FindFirstFileA
lstrcmpA
FindNextFileA
GetLastError
FindClose
GetFileAttributesExA
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetDriveTypeA
lstrcpyA
MoveFileA
CreateDirectoryA
WriteFile
GetTempPathA
lstrlenA
GetFileSize
DeleteFileA
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
GetCurrentThreadId
SetEvent
Sleep
GetVersionExA
GetVersion
QueryPerformanceCounter
GetOEMCP
WaitForSingleObject
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
CreateFileA
GetFileSizeEx
SetFilePointerEx
CloseHandle
ReadFile
GetTickCount
LoadLibraryA
QueryPerformanceFrequency
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Share Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE