tcpGDC
Static task
static1
Behavioral task
behavioral1
Sample
a16a18aae8e076074d47533ac6ac5f3f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a16a18aae8e076074d47533ac6ac5f3f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a16a18aae8e076074d47533ac6ac5f3f_JaffaCakes118
-
Size
27KB
-
MD5
a16a18aae8e076074d47533ac6ac5f3f
-
SHA1
1d2377cade3ff81e6d4c5f8d822bec728262b101
-
SHA256
6054a6d696bb172fd40d3096547c1c50caee5028dc20821058910b6e1e992514
-
SHA512
b6662b0f7f63152bfd38c1f45856da9d203cbea3cde15ee4880934ea0a4301f105a9bc112832b694a913823ceb6b7661f9d90ddaeac906d04e46dbf8085abca7
-
SSDEEP
768:uGHP/m3kdQdHK+cIoHwi3APc2jivCXCTpMSFtno:uKsq+PPPc2jTbSbno
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a16a18aae8e076074d47533ac6ac5f3f_JaffaCakes118
Files
-
a16a18aae8e076074d47533ac6ac5f3f_JaffaCakes118.dll windows:4 windows x86 arch:x86
efd88fb2ebad1e070b240a295e984564
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
GetWindowTextA
GetForegroundWindow
GetClassNameA
EnumChildWindows
CharLowerA
wsprintfA
kernel32
CloseHandle
ConnectNamedPipe
CreateDirectoryA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GetTickCount
HeapAlloc
HeapFree
IsBadCodePtr
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
OpenProcess
RtlZeroMemory
SetThreadPriority
Sleep
TerminateThread
UnmapViewOfFile
VirtualAlloc
VirtualProtectEx
WideCharToMultiByte
ord5
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
_llseek
CloseHandle
ConnectNamedPipe
CreateDirectoryA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitThread
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GetTickCount
HeapAlloc
HeapFree
IsBadCodePtr
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
OpenProcess
RtlZeroMemory
SetThreadPriority
Sleep
TerminateThread
UnmapViewOfFile
VirtualAlloc
VirtualProtectEx
WideCharToMultiByte
ord5
_lread
_lwrite
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
_llseek
shell32
ShellExecuteA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyA
RegCloseKey
wininet
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetQueryDataAvailable
InternetReadFile
HttpOpenRequestA
ws2_32
accept
WSAStartup
WSACleanup
closesocket
connect
gethostbyname
htons
inet_addr
listen
recv
send
sendto
setsockopt
shutdown
socket
bind
ole32
CoTaskMemFree
urlmon
URLDownloadToFileA
Exports
Exports
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ