Static task
static1
Behavioral task
behavioral1
Sample
95d176b114285b23bc8fbde7fb795faa_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
95d176b114285b23bc8fbde7fb795faa_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
95d176b114285b23bc8fbde7fb795faa_JaffaCakes118
-
Size
132KB
-
MD5
95d176b114285b23bc8fbde7fb795faa
-
SHA1
444744f641d7156f122e15a94ad96e6ddc3d973e
-
SHA256
1102c258d1997b4576c4ddadbc2536e8c150c03b6b3bd77856c5bd500a934839
-
SHA512
78799ca59471f5c667f825180d336be775eb55ee6e4429865932e1e22d3db9aefaefdf116c157ff94b3a302a1670e3e4bb96d9761242a5441fd380ece0c1e1ba
-
SSDEEP
3072:3ffqwt4wIqYhb5tgKRT9268H7RV680DQV7xmM0pI5zghOjHFlkHGe2:3KweW00KtWt7MZI5AOjt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95d176b114285b23bc8fbde7fb795faa_JaffaCakes118
Files
-
95d176b114285b23bc8fbde7fb795faa_JaffaCakes118.dll windows:4 windows x86 arch:x86
db3be9ed3f89fee9f055eb582ac1bc94
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetFileAttributesW
GetVersion
GlobalUnlock
Sleep
CreateThread
TryEnterCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
GetModuleFileNameW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GlobalSize
InterlockedExchange
ReleaseMutex
WaitForSingleObject
GetThreadLocale
GetVolumeInformationW
LocalAlloc
GetLocaleInfoW
InterlockedCompareExchange
GetModuleHandleW
GlobalAlloc
lstrcmpiW
TerminateProcess
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
GetLastError
lstrlenW
DisableThreadLibraryCalls
lstrcatW
lstrcpyW
LoadLibraryW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DeleteCriticalSection
SetLastError
lstrcpynW
FormatMessageW
LocalFree
IsBadReadPtr
FreeLibrary
LoadLibraryExW
GetSystemWindowsDirectoryW
OutputDebugStringA
VirtualProtect
GlobalFree
GetCommandLineA
CloseHandle
user32
LoadBitmapW
KillTimer
GetFocus
GetActiveWindow
SendDlgItemMessageW
IsDlgButtonChecked
LoadStringW
wsprintfW
MessageBoxW
LoadImageW
SetDlgItemTextW
WinHelpW
UpdateWindow
LoadIconW
ReleaseDC
DialogBoxParamW
GetWindow
GetDlgItemTextW
IsCharAlphaW
CheckRadioButton
GetDlgCtrlID
GetWindowContextHelpId
GetWindowTextLengthW
CheckDlgButton
ShowWindow
IsWindowEnabled
GetWindowRect
SendMessageW
InvalidateRect
GetClientRect
SetTimer
ValidateRect
SetWindowTextW
SetWindowLongW
SetFocus
EndDialog
GetWindowTextW
GetDlgItem
GetWindowLongW
RegisterClipboardFormatW
PostMessageW
GetParent
EnableWindow
SetWindowPos
MapWindowPoints
GetDC
advapi32
RegQueryValueExW
MakeSelfRelativeSD
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
ReportEventW
RegOpenKeyA
RegDeleteKeyW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
EqualSid
CopySid
InitializeSecurityDescriptor
AllocateAndInitializeSid
FreeSid
LsaFreeMemory
GetSecurityDescriptorControl
RegOpenKeyW
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
RegCloseKey
gdi32
DeleteObject
SelectObject
GetTextMetricsW
ole32
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
StringFromCLSID
ReleaseStgMedium
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
StringFromGUID2
CoTaskMemFree
msvcr71
_except_handler3
wcscpy
_adjust_fdiv
free
mbstowcs
wcstol
wcstoul
malloc
wcslen
_wcsnicmp
_initterm
wcsncpy
wcstombs
_onexit
_lock
__dllonexit
_unlock
_amsg_exit
_vsnwprintf
memcpy
_ultow
memset
_wcsicmp
wcschr
__CxxFrameHandler
_CxxThrowException
_XcptFilter
__CppXcptFilter
atoi
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ