Static task
static1
Behavioral task
behavioral1
Sample
96703d999b25d8c220d63dc6937ae948_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
96703d999b25d8c220d63dc6937ae948_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
96703d999b25d8c220d63dc6937ae948_JaffaCakes118
-
Size
104KB
-
MD5
96703d999b25d8c220d63dc6937ae948
-
SHA1
b0d9a2a6501d3e9801c104162a6bb555ca27dad8
-
SHA256
dbad9dcef3c6bbe16b84a6646e1dbf73811b000d96837df6414b19ad6e4c3112
-
SHA512
4890a46ae2ac6620a0d5c863522766e9b84762d9beae341e2e5b73ce9ef6866111d4204b2dc085ba705e02a1e6d2216431249cf34c98b7dcf82771a33764656e
-
SSDEEP
3072:XIdw/0UcPi/0kH6KLaiL5uw1HzNFJTxe2MO:XIe8rKs6lLh5u2TNI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96703d999b25d8c220d63dc6937ae948_JaffaCakes118
Files
-
96703d999b25d8c220d63dc6937ae948_JaffaCakes118.dll windows:4 windows x86 arch:x86
86962700d34d7f05087a2f455db69e8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
PlaySoundW
waveOutRestart
waveOutUnprepareHeader
midiOutSetVolume
midiInStart
mmioInstallIOProcA
dinput
DirectInputCreateW
ole32
PropVariantClear
IsEqualGUID
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
user32
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClassA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
GetTopWindow
GetKeyState
SetSystemCursor
GetCaretPos
EnumPropsA
EmptyClipboard
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CharToOemA
CharLowerBuffA
BeginDeferWindowPos
ShowWindow
UpdateWindow
GetForegroundWindow
ws2_32
WSAUnhookBlockingHook
WSCDeinstallProvider
closesocket
connect
gethostbyname
htons
socket
WSAGetLastError
kernel32
MulDiv
HeapCreate
HeapAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetTimeZoneInformation
ReadFile
GetSystemInfo
GetSystemDefaultLangID
GetStringTypeExA
GetPrivateProfileSectionW
OpenEventW
GetFileAttributesExA
GetCurrentProcessId
GetConsoleOutputCP
GetConsoleAliasA
GetCommandLineA
GetBinaryTypeA
FormatMessageA
FlushConsoleInputBuffer
FindNextVolumeW
FindAtomW
SetEnvironmentVariableA
SetFileTime
GetModuleHandleA
OpenJobObjectW
TlsGetValue
DuplicateHandle
WaitForMultipleObjectsEx
lstrcmpA
GetTempPathW
Beep
BindIoCompletionCallback
CloseHandle
CreateSemaphoreA
DeleteCriticalSection
FindAtomA
EnumTimeFormatsA
ExitProcess
advapi32
GetAclInformation
FileEncryptionStatusA
GetAce
GetSecurityDescriptorDacl
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
I_ScSetServiceBitsA
LookupPrivilegeNameW
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaRemoveAccountRights
LsaSetInformationTrustedDomain
AddAccessDeniedAce
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ