Static task
static1
Behavioral task
behavioral1
Sample
a25aaa3af18cd12230d6f43a6f70bc81_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a25aaa3af18cd12230d6f43a6f70bc81_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a25aaa3af18cd12230d6f43a6f70bc81_JaffaCakes118
-
Size
230KB
-
MD5
a25aaa3af18cd12230d6f43a6f70bc81
-
SHA1
951f5686c3e901e6b47f774ed117166258ed9ffd
-
SHA256
56dc8bb5779002a66ffd9ac2e878c85264deed4aa63a52b9359cfe685354d9b8
-
SHA512
1a970eb540dc1366237ebc6bfc05f990cd02ac9e8acb0db04b197a17137a502d6d8757846e8aeff5e21acb5e59aaa530627ad62a930d315dc1950f5b91653bb1
-
SSDEEP
3072:fceW+m3CuR53n5GKxgizxo7drAAgt4hODBSnl9froDS1z8EQpcAlxoKA/8j:fceWnCuRln5++4pA4hOK8GztGDlC/8j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a25aaa3af18cd12230d6f43a6f70bc81_JaffaCakes118
Files
-
a25aaa3af18cd12230d6f43a6f70bc81_JaffaCakes118.dll windows:4 windows x86 arch:x86
7ef3d4c30aeec5a2f21124f45dd5a80f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
GetCommandLineA
GlobalUnlock
OutputDebugStringA
Thread32Next
TerminateThread
GetThreadPriority
Thread32First
CreateToolhelp32Snapshot
GetWindowsDirectoryA
GetCurrentProcessId
GetLocalTime
LoadLibraryA
GetCurrentThreadId
WritePrivateProfileStringA
GetSystemDirectoryA
TerminateProcess
OpenProcess
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
DeleteFileA
WriteFile
GetFileSize
VirtualProtectEx
CloseHandle
ReadFile
VirtualFree
WideCharToMultiByte
MultiByteToWideChar
Process32Next
Process32First
IsBadReadPtr
GlobalAlloc
ExitProcess
GetPrivateProfileIntA
GetPrivateProfileStringA
GetComputerNameA
GetCurrentProcess
CreateThread
Sleep
OpenEventA
GlobalSize
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CancelIo
InterlockedExchange
SetEvent
ResetEvent
lstrcpyA
lstrlenA
LocalAlloc
SetErrorMode
lstrcmpiA
lstrcatA
GetTickCount
WaitForSingleObject
RtlUnwind
GetStringTypeW
GetModuleFileNameA
GetStringTypeA
GlobalLock
VirtualAlloc
CreateEventA
GetModuleHandleA
ReadProcessMemory
GetProcAddress
GlobalFree
SetThreadPriority
user32
keybd_event
GetClassNameA
GetClientRect
ClientToScreen
ToUnicode
GetAsyncKeyState
GetKeyState
GetKeyboardState
MapVirtualKeyA
ToAscii
GetDC
ReleaseDC
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetInputState
PostThreadMessageA
GetMessageA
GetWindowThreadProcessId
IsWindowVisible
ExitWindowsEx
BlockInput
GetForegroundWindow
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
SetRect
GetSystemMetrics
GetDesktopWindow
GetCursorPos
wsprintfA
GetWindowTextA
FindWindowA
EnumChildWindows
SendMessageA
IsWindowEnabled
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetPaletteEntries
CreateHalftonePalette
GetPixel
advapi32
OpenProcessToken
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
RegQueryValueExA
msvcrt
_ftol
__CxxFrameHandler
realloc
??2@YAPAXI@Z
strstr
??3@YAXPAX@Z
_CxxThrowException
memmove
ceil
_beginthreadex
calloc
free
??1type_info@@UAE@XZ
ws2_32
socket
htons
connect
setsockopt
send
select
closesocket
recv
ntohs
WSAStartup
WSACleanup
gethostbyname
Sections
.text Size: 211KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ