getPlateList
Static task
static1
Behavioral task
behavioral1
Sample
9640ea71b4de656fe453948b0c66e5eb_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9640ea71b4de656fe453948b0c66e5eb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9640ea71b4de656fe453948b0c66e5eb_JaffaCakes118
-
Size
51KB
-
MD5
9640ea71b4de656fe453948b0c66e5eb
-
SHA1
56ae0e1cd858df9ffc99f3e61ebaa7e99494afb1
-
SHA256
25163f8d860ba1f0c2f74b7dc181e05dbf2d9922de0a06f9b0c8774666b15351
-
SHA512
d92a7cf288bc14609fd184de087885a3bae925225ef8e1466b5441e8581793fc108b6d69ad8757f8b1719cbab6eab608f2d8473546347f9c2b6e878a73523c85
-
SSDEEP
768:WcbEwPxct1h4jyGLgcgr5U3KzgWq50Sf/znAWtvLk11PIM5FLDLtL7LZWZ:FxHWGpKDqf7nAFT5lfdHZW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9640ea71b4de656fe453948b0c66e5eb_JaffaCakes118
Files
-
9640ea71b4de656fe453948b0c66e5eb_JaffaCakes118.dll windows:5 windows x86 arch:x86
60a16906138f2cda85bbc42c87ec9db0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
DisableThreadLibraryCalls
CreateThread
WideCharToMultiByte
VirtualFreeEx
MultiByteToWideChar
lstrcmpiA
GetProcAddress
VirtualAllocEx
lstrcmpiW
GetModuleHandleA
GetCurrentProcessId
WriteProcessMemory
lstrcmpA
VirtualFree
VirtualAlloc
VirtualProtect
GetModuleHandleW
GetModuleFileNameA
IsBadReadPtr
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapFree
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
WriteFile
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
user32
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
ntdll
NtClose
NtQueryInformationThread
RtlFreeAnsiString
NtQueueApcThread
NtOpenProcess
strstr
RtlUnicodeStringToAnsiString
Exports
Exports
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ