Static task
static1
Behavioral task
behavioral1
Sample
93dd9c5f8e9f00359306b3e60f5741cc_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
93dd9c5f8e9f00359306b3e60f5741cc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
93dd9c5f8e9f00359306b3e60f5741cc_JaffaCakes118
-
Size
124KB
-
MD5
93dd9c5f8e9f00359306b3e60f5741cc
-
SHA1
789c5e852553d88010c73d5da68467715c7d85bb
-
SHA256
ffddcaf482bc7d177789bb676fa62b1595ff9d26d0442a538c7eb7dc063c397f
-
SHA512
f37f82aa803a7f2f6307073e546c825598ccf32fe415ed2c20f65150c7eacde34fdd16aa4577e1ea93eb96aafcc7902dd26f1e2f2d8641c54bf58c2a5fee74fe
-
SSDEEP
3072:rXNfOeUTg7o0HEVhkPK7HmykSZ+QtrJYkVY3hfwjl4Sv9nrPOD:5bUT10LPKE+WHhfwrRPOD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93dd9c5f8e9f00359306b3e60f5741cc_JaffaCakes118
Files
-
93dd9c5f8e9f00359306b3e60f5741cc_JaffaCakes118.dll windows:4 windows x86 arch:x86
d869ac033d5ed8a3448dc4e8d0c35df3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateNamedPipeW
CreateThread
CreateMutexW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
GetTempPathW
DisableThreadLibraryCalls
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
ConnectNamedPipe
SetEvent
CreateEventW
WaitForMultipleObjects
DisconnectNamedPipe
GetProcAddress
FreeLibrary
OpenProcess
GetVersionExW
ProcessIdToSessionId
GetCurrentProcess
DuplicateHandle
VirtualProtect
GetProcessHeap
GetCurrentThread
LocalFree
GetCurrentProcessId
GetCurrentThreadId
CloseHandle
GetSystemDirectoryW
LoadLibraryExW
GetSystemWindowsDirectoryW
CreateDirectoryW
GetCommandLineA
SetUnhandledExceptionFilter
LCMapStringA
HeapSize
LoadLibraryA
RtlUnwind
GetVersionExA
InterlockedExchange
VirtualQuery
ExitProcess
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
HeapAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
GetSystemInfo
user32
OpenWindowStationW
GetUserObjectInformationW
wsprintfA
CloseWindowStation
advapi32
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
RevertToSelf
OpenThreadToken
ImpersonateNamedPipeClient
GetSecurityInfo
CreateProcessAsUserW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetServiceStatus
RegisterServiceCtrlHandlerExW
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
DuplicateToken
AddAccessDeniedAce
AccessCheck
GetSecurityDescriptorDacl
AllocateAndInitializeSid
FreeSid
rpcrt4
RpcBindingSetAuthInfoExW
RpcBindingFromStringBindingW
RpcBindingFree
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ