dbg0sym3.p2d3b4
Static task
static1
Behavioral task
behavioral1
Sample
a173eab63171a4669ae094d04f51509b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a173eab63171a4669ae094d04f51509b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a173eab63171a4669ae094d04f51509b_JaffaCakes118
-
Size
136KB
-
MD5
a173eab63171a4669ae094d04f51509b
-
SHA1
feb7ab9e7fa5a6107862bae939b6d80059954bd0
-
SHA256
9a59e5b0635429f1684d6686e0632975ea1d2ea99052a4adf229a82efa3ab6fc
-
SHA512
ce0e9f56a0591d723b57ad6d0b6452709c9a52311d5e21de5d455f7aa936d5059228e9da1e0c20bd0b86c3a7fde085288aa8480f895c5e07800c0b5d9bffc525
-
SSDEEP
3072:QUzIbdkOnHL0FjUo5hXKDfi0FjYOLFHqukkkkfkkkk4kkkZkk:Qy4dnro50fi0dYYkkkkfkkkk4kkkZkk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a173eab63171a4669ae094d04f51509b_JaffaCakes118
Files
-
a173eab63171a4669ae094d04f51509b_JaffaCakes118.dll windows:4 windows x86 arch:x86
53cc44d3bba4a0cebb1c8d7cd25dc354
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LCMapStringW
HeapReAlloc
CreateTimerQueueTimer
ResetEvent
SetLastError
CreateFileMappingW
RaiseException
WriteFile
LoadLibraryExW
VirtualProtect
DuplicateHandle
GetEnvironmentStrings
GetSystemInfo
WaitForSingleObject
GetStdHandle
TerminateProcess
GetTickCount
InterlockedCompareExchange
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsA
HeapCreate
ConnectNamedPipe
GetCurrentProcessId
GetStartupInfoA
Sleep
IsBadCodePtr
InterlockedDecrement
LeaveCriticalSection
GetCPInfo
CloseHandle
MapViewOfFile
GetACP
GetOEMCP
MultiByteToWideChar
IsBadReadPtr
HeapFree
QueryPerformanceCounter
EnterCriticalSection
CreateNamedPipeA
CreateMutexW
GetCurrentThreadId
GetStringTypeW
LoadLibraryA
GetModuleHandleA
LCMapStringA
SetEvent
GetFileType
DeleteTimerQueueTimer
VirtualAlloc
UnhandledExceptionFilter
InterlockedExchangeAdd
CreateThread
DeleteCriticalSection
RtlUnwind
ReadFile
InterlockedExchange
HeapAlloc
GetStringTypeA
FreeEnvironmentStringsW
GetLocaleInfoA
VirtualQuery
SetHandleCount
HeapSize
HeapDestroy
GetSystemTimeAsFileTime
lstrcatW
GetCurrentProcess
InterlockedIncrement
WideCharToMultiByte
SetUnhandledExceptionFilter
GetVersionExA
DisconnectNamedPipe
GetModuleFileNameA
OpenProcess
InitializeCriticalSection
ReleaseMutex
lstrcpyW
UnmapViewOfFile
GetLastError
WaitForMultipleObjects
VirtualFree
CreateEventA
CopyFileA
IsBadWritePtr
GetProcAddress
ExitProcess
user32
wsprintfW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Exports
Exports
dttftbeqkkbxwxwucecdzohkdesrnizughvwoiefjkzbxkfbyvxfvprsohlz
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ