droqp
Static task
static1
Behavioral task
behavioral1
Sample
8e72247bc035ef11469059f49e59acef_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e72247bc035ef11469059f49e59acef_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8e72247bc035ef11469059f49e59acef_JaffaCakes118
-
Size
38KB
-
MD5
8e72247bc035ef11469059f49e59acef
-
SHA1
83c808da78f9f7fbd623fa648e5b8e5c7dd43e66
-
SHA256
ff6034cdea0d72073fb7437a250df22014f37ea36241802c5b708a509656cb3a
-
SHA512
d4c8c370d303c033fc12d253df24767d5f9e5db1ecea38c933067dc9f9c29df435ee089f1ebceb1c0a8a3ccaed17ca1d6a859fef812eafd9ab73fc8c3a739bee
-
SSDEEP
192:4b68YFM8eny/7B8Md4QrYx/ud8SboipMn6dF2bI9SfriJjMI6XZn0Ze3eWUIsLgq:4cTenKf4Zll0bWUIsB9uKBQZHE0tyo8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e72247bc035ef11469059f49e59acef_JaffaCakes118
Files
-
8e72247bc035ef11469059f49e59acef_JaffaCakes118.dll windows:4 windows x86 arch:x86
c81448866ec360643ad26fe667f7c070
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
OpenProcess
Sleep
OutputDebugStringA
WinExec
GetSystemDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
GetWindowsDirectoryA
GetLastError
FreeLibrary
GlobalFree
LoadLibraryExA
GlobalAlloc
CreateThread
FreeResource
Module32First
Module32Next
FindResourceA
LoadResource
LockResource
CreateFileA
SizeofResource
WriteFile
CloseHandle
GetSystemTime
advapi32
RegQueryValueExA
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
msvcp60
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
msvcrt
strcpy
strstr
memset
strcat
strlen
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_stricmp
Exports
Exports
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ