Static task
static1
Behavioral task
behavioral1
Sample
a4211e70c1e6dd5ad8ea9aa95707b6a6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4211e70c1e6dd5ad8ea9aa95707b6a6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a4211e70c1e6dd5ad8ea9aa95707b6a6_JaffaCakes118
-
Size
124KB
-
MD5
a4211e70c1e6dd5ad8ea9aa95707b6a6
-
SHA1
455317307ced3b87c8ea2769f7c1752f263d4fcd
-
SHA256
71c081a719afdeb2b504064123fe28e634595bdb7ff658aa6776732f6361cded
-
SHA512
0a742a3146f455821c85f961483a0d25a682f2db18e208fe0c3ecf327a218f7d3e8d05f5185608d4588e236e9e6cabef6639501e9094d446f2e6d68720127a97
-
SSDEEP
1536:LD+zFKdyyIo8eTfst73rQd+St41XgT0jP0EWIYpI3boO9+PbyIlDvBX60:LizYZZeLEgSm1XaPTIyooO9EeIlj560
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4211e70c1e6dd5ad8ea9aa95707b6a6_JaffaCakes118
Files
-
a4211e70c1e6dd5ad8ea9aa95707b6a6_JaffaCakes118.dll windows:4 windows x86 arch:x86
98293204d98851bee746a5b0333ce68a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSize
GetFileTime
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
RaiseException
HeapSize
HeapReAlloc
GetACP
SetHandleCount
GetModuleHandleA
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
WritePrivateProfileStringA
GlobalFlags
GetVersion
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
FreeLibrary
GetModuleFileNameA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
lstrcpyA
FindFirstFileA
GetLastError
SetLastError
FindClose
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreateThread
SetFileAttributesA
CopyFileA
GetTempPathA
OpenProcess
GetShortPathNameA
DeleteFileA
GetSystemDirectoryA
GetStdHandle
lstrlenA
user32
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetWindowLongA
ShowWindow
GetDlgItem
LoadStringA
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
GetSystemMetrics
CharUpperA
wsprintfA
PostMessageA
PostQuitMessage
GetWindowThreadProcessId
IsWindow
GetCursorPos
GetWindowTextA
SetWindowPos
GetKeyboardState
GetAsyncKeyState
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetForegroundWindow
KillTimer
SetTimer
GetClassNameA
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetMapMode
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
CreateBitmap
DeleteDC
DeleteObject
SaveDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
comctl32
ord17
wsock32
WSAStartup
WSACleanup
gethostname
wininet
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetCloseHandle
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ