Static task
static1
Behavioral task
behavioral1
Sample
93fc5e016599c7142115c5c7d76ae8f5_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
93fc5e016599c7142115c5c7d76ae8f5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
93fc5e016599c7142115c5c7d76ae8f5_JaffaCakes118
-
Size
9KB
-
MD5
93fc5e016599c7142115c5c7d76ae8f5
-
SHA1
47f30c89343823ff630b2629ed01af58d22c2fc8
-
SHA256
91968c99eeae8a008651111cccd9cdb8e7f2304dd63cc40c57dd2ce03432c93d
-
SHA512
e0b69739730282a87750d41e193c49727a8b3fa8afa4af5bdfab63a07ed5a26bc4f576fcb9e861dbcd0e4731f8263d78ac550a509acaa7e464bcd4b9e9cfb865
-
SSDEEP
192:oDAz7mr3IcslxWTKjvydGrQX2mY5Mtv8d17Ao:ArDqWTqyGKkTk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93fc5e016599c7142115c5c7d76ae8f5_JaffaCakes118
Files
-
93fc5e016599c7142115c5c7d76ae8f5_JaffaCakes118.dll windows:4 windows x86 arch:x86
cb566e6f0c9e2bb0265ef350ba79b613
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteProcessMemory
VirtualProtectEx
ReadProcessMemory
GetCurrentProcess
CloseHandle
CreateThread
GetModuleFileNameA
GetComputerNameA
GetCurrentProcessId
GetModuleHandleA
IsBadReadPtr
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
VirtualFree
GetProcAddress
VirtualAlloc
user32
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetWindowTextA
wsprintfA
FindWindowA
GetWindowThreadProcessId
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 514B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ