Static task
static1
Behavioral task
behavioral1
Sample
a4c97c9432dce1ea8c89a54b66fd3335_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4c97c9432dce1ea8c89a54b66fd3335_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a4c97c9432dce1ea8c89a54b66fd3335_JaffaCakes118
-
Size
25KB
-
MD5
a4c97c9432dce1ea8c89a54b66fd3335
-
SHA1
cffba61c46b4f2e6e0dcd1facd1eb9296681bbc0
-
SHA256
e3ae71d98dda8c00333a98b3ca1a191c7eb8d4220f35d521455e6af200b6feb5
-
SHA512
f1dba996d507d71d6cd161a5eb3f4db28aed4596789d0fb9d82c79635225e29da5de09cd6e073f21872f9f610f4ada2e69106f10ca1ca6964a0e7df27a0563fb
-
SSDEEP
384:ZwBYMQP8fISZIvWHpPx9GOr52RJiBIt0NDL/T2M5Ho0Bi+dLjR:Zwp5LJJ9Gu52RQBItWDr7BpLd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4c97c9432dce1ea8c89a54b66fd3335_JaffaCakes118
Files
-
a4c97c9432dce1ea8c89a54b66fd3335_JaffaCakes118.dll windows:4 windows x86 arch:x86
addda759cf5453fb0a953414508ec87f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalFree
GlobalUnlock
IsBadReadPtr
CloseHandle
RaiseException
InitializeCriticalSection
GetPrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
MultiByteToWideChar
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
WriteProcessMemory
WideCharToMultiByte
Sleep
GlobalAlloc
GlobalLock
ReadProcessMemory
CreateThread
GetCurrentProcess
GetCurrentThreadId
VirtualProtectEx
TerminateThread
GetCurrentProcessId
GetLastError
CreateMutexA
GetCurrentThread
user32
GetForegroundWindow
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
GetWindowTextA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
msvcrt
fclose
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strrchr
wcslen
sscanf
strcat
sprintf
strcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strlen
memcpy
strncpy
strchr
strstr
_strnicmp
fread
fopen
memset
strcmp
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ