Static task
static1
Behavioral task
behavioral1
Sample
a2dda815d21d4f4d798302b799c02e04_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a2dda815d21d4f4d798302b799c02e04_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a2dda815d21d4f4d798302b799c02e04_JaffaCakes118
-
Size
224KB
-
MD5
a2dda815d21d4f4d798302b799c02e04
-
SHA1
ff6b774de71fd45fe6cac3370b0fceac5effe88f
-
SHA256
4043176f2561ad74a1989d60a37a2579ebc611c6f91334e2d06587498bbc1524
-
SHA512
4b4109acdae21d0c0b24b1fe4d32bc21debb17cb4bbdc2f15560f85f357ecd5685189e8c401fa2f7a710ba6fe7b684af7682370fbd55ee53c905dd56b40e40d2
-
SSDEEP
3072:xg7TcDczVTLaMxtQNkaETYLboB2jN9tmpHdIRiqtzqbe9:3DcZTLjekRgsa7MWRiUq69
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2dda815d21d4f4d798302b799c02e04_JaffaCakes118
Files
-
a2dda815d21d4f4d798302b799c02e04_JaffaCakes118.dll windows:4 windows x86 arch:x86
c718d14b38ee014deebdf491a06f29d1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateProcessW
GetLastError
CloseHandle
GetSystemTime
GetTickCount
CreateEventW
WaitForSingleObject
SetEvent
CreateThread
MultiByteToWideChar
WideCharToMultiByte
Sleep
SetFilePointer
SystemTimeToFileTime
GetFileAttributesW
CreateFileW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
CreateDirectoryW
WriteFile
SetFileTime
LoadLibraryW
GetProcAddress
FindClose
FindFirstFileW
GetWindowsDirectoryW
GetTempFileNameW
CreateFileA
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
LoadLibraryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DuplicateHandle
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
CreatePipe
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
advapi32
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ole32
CoCreateInstance
CoInitializeEx
StringFromGUID2
CoCreateGuid
CoInitialize
CoUninitialize
wininet
InternetCheckConnectionW
HttpQueryInfoW
InternetReadFile
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetAttemptConnect
shlwapi
SHDeleteKeyW
Sections
.text Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 868B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ