UtilcfgCmds
Static task
static1
Behavioral task
behavioral1
Sample
9ffcd59f32b5a83c340788147286e58b_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9ffcd59f32b5a83c340788147286e58b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9ffcd59f32b5a83c340788147286e58b_JaffaCakes118
-
Size
84KB
-
MD5
9ffcd59f32b5a83c340788147286e58b
-
SHA1
91c6e612cab4978b60fc0ad6289e4b336b9f4359
-
SHA256
f73209e2b505a82c4b89ebe364ad1877fc1e7e5dbf8ce0a3f44e237870985be2
-
SHA512
df3773e8a635d0bbf479e5b86c637043d503e064581be14e9c48e6420bb0299b3154657ca770f6e246288a86633c790390474d689e42e45604faec8d0b20efeb
-
SSDEEP
1536:fG3eiycRZAlb1vqpKtJRfo7A0HqB4DZzFOTVyWDgVCtKhUaWKkmRHi6+EtgEfgxM:fGuiXRZKqpyJlyA0PdzMTVyWfUaaWsgY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ffcd59f32b5a83c340788147286e58b_JaffaCakes118
Files
-
9ffcd59f32b5a83c340788147286e58b_JaffaCakes118.dll windows:4 windows x86 arch:x86
350359ac83df492f7c0efa142a14cc0c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtect
LoadLibraryA
CreateDirectoryA
WaitForSingleObject
ReleaseMutex
InitializeCriticalSectionAndSpinCount
lstrlenA
InterlockedDecrement
LocalFree
HeapAlloc
UnmapViewOfFile
GetProcAddress
CreateFileMappingA
EnterCriticalSection
GetModuleFileNameA
WriteFile
CreateProcessA
GetLastError
GetModuleHandleA
lstrlenW
InterlockedCompareExchange
GlobalMemoryStatus
FreeConsole
GlobalDeleteAtom
GetLogicalDriveStringsW
SystemTimeToTzSpecificLocalTime
InterlockedExchangeAdd
QueryPerformanceFrequency
GetDateFormatW
WriteProfileStringW
HeapWalk
HeapCreate
ExitThread
DeleteCriticalSection
IsDBCSLeadByte
GetLongPathNameW
UnregisterWaitEx
SetDefaultCommConfigW
GetHandleInformation
WaitForMultipleObjectsEx
GetProfileIntW
GetUserDefaultLangID
RaiseException
ReadConsoleInputA
CreateFileMappingW
GlobalMemoryStatusEx
SearchPathW
HeapUnlock
LocalFlags
OpenJobObjectW
SetCommMask
DeleteFileA
CreateFileW
EnumSystemLocalesA
WriteConsoleW
SetConsoleCtrlHandler
GetSystemDirectoryW
GetFileAttributesExW
MoveFileW
GetEnvironmentVariableA
ReadConsoleW
GetTempFileNameW
FindFirstChangeNotificationW
WriteProcessMemory
OpenFileMappingW
FindClose
EnumResourceLanguagesA
SetVolumeLabelA
GlobalFindAtomW
IsDBCSLeadByteEx
GetTempFileNameA
ole32
OleCreateMenuDescriptor
StgOpenStorageOnILockBytes
StgCreateDocfile
OleCreateLinkToFile
OleInitialize
CoCreateInstanceEx
RevokeDragDrop
CoLockObjectExternal
CoSetProxyBlanket
OleIsRunning
OleGetAutoConvert
StgOpenStorageEx
CoUninitialize
OleCreateFromFile
user32
MessageBoxA
InSendMessage
IsDialogMessageA
SendNotifyMessageW
PostMessageA
UnhookWindowsHookEx
DispatchMessageA
SetWinEventHook
SetTimer
CallNextHookEx
DestroyWindow
RegisterClassExA
PostQuitMessage
GetMessageA
KillTimer
SendMessageA
GetClassNameA
RegisterWindowMessageA
GetWindowThreadProcessId
TranslateMessage
GetParent
PostMessageW
IsDlgButtonChecked
GetSysColor
DialogBoxIndirectParamA
IsCharAlphaA
LoadIconA
LoadAcceleratorsW
GetDlgItemTextA
RemovePropW
DispatchMessageW
CharUpperA
WindowFromDC
LoadCursorW
PostThreadMessageA
wsprintfW
GetMonitorInfoW
GetMenu
DialogBoxParamW
SetWindowWord
GetUpdateRgn
CopyIcon
ShowWindow
GetWindowDC
BeginPaint
GetAsyncKeyState
DrawIcon
DefFrameProcA
SetProcessDefaultLayout
WinHelpA
PeekMessageA
SetParent
AdjustWindowRectEx
ModifyMenuA
MapVirtualKeyW
GetScrollRange
GetWindowTextA
SendMessageW
TabbedTextOutW
ModifyMenuW
shlwapi
PathIsNetworkPathW
StrStrIA
StrRChrW
StrDupW
StrNCatW
PathAddBackslashW
StrStrW
AssocQueryStringW
PathQuoteSpacesW
UrlUnescapeW
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ