fivj3vj.jef
Static task
static1
Behavioral task
behavioral1
Sample
9692ed3c3d530a8fbf01cf0176604a7f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9692ed3c3d530a8fbf01cf0176604a7f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9692ed3c3d530a8fbf01cf0176604a7f_JaffaCakes118
-
Size
120KB
-
MD5
9692ed3c3d530a8fbf01cf0176604a7f
-
SHA1
5b4b8ef4ff1178f6560987f3b7c04d2b02a35e23
-
SHA256
82a6a78a44452a33e8db810f5421e4a0e6084ca434f9f13cdc1ec8204ab494ce
-
SHA512
8faf9d1c1c657c3bc9107a398d5f97bea811f755e0609d102ede89f9fd1a3f1d7bd1ebe0a60f0b698e3593a607a910da97a54a42ed5ec9010c1d3800c44a477e
-
SSDEEP
1536:LpZ8aY6WAmls/yFQS8xDRfCz/AP4KLMQEkqjwqt1gdEH1kX9YkuV8P16I6:rvzmluS8x4zozEVmYiGkuVal6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9692ed3c3d530a8fbf01cf0176604a7f_JaffaCakes118
Files
-
9692ed3c3d530a8fbf01cf0176604a7f_JaffaCakes118.dll windows:4 windows x86 arch:x86
6cf54066909116b097e12615f683383b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SetFileTime
MoveFileA
FreeEnvironmentStringsW
lstrcmpA
CreateThread
HeapReAlloc
CompareFileTime
lstrlenA
DisableThreadLibraryCalls
TlsGetValue
LCMapStringA
SetEvent
SetFilePointer
FlushViewOfFile
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
VirtualAlloc
VirtualQuery
InterlockedExchange
InterlockedDecrement
LCMapStringW
OpenFileMappingW
GetSystemTimeAsFileTime
GetVersionExA
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetStringTypeW
GetSystemInfo
GetFullPathNameA
lstrcmpiA
GetFileSize
GetStringTypeA
DeleteCriticalSection
HeapFree
GetEnvironmentVariableA
LocalAlloc
GetEnvironmentStringsW
OpenFileMappingA
ReleaseMutex
GetDiskFreeSpaceA
CreateFileA
CreateEventA
TlsAlloc
GetTickCount
CreateMutexW
UnmapViewOfFile
GetCPInfo
WideCharToMultiByte
GetFileType
CreateFileW
FreeEnvironmentStringsA
Sleep
GetEnvironmentStrings
GetCurrentThreadId
EnterCriticalSection
lstrlenW
MoveFileW
GetLastError
DeleteFileA
LeaveCriticalSection
CreateMutexA
GetFullPathNameW
TlsFree
DeleteFileW
GetStringTypeExA
GetCurrentProcessId
TerminateProcess
WriteFile
LocalFree
InterlockedIncrement
InitializeCriticalSection
MapViewOfFile
VirtualProtect
SetEndOfFile
FreeLibrary
WaitForSingleObject
GetCurrentProcess
VirtualFree
CloseHandle
SetHandleCount
GetDiskFreeSpaceW
Exports
Exports
aumrotc
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 628B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ