ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
a52155c26ba9e9dee43d1ed7825effa9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a52155c26ba9e9dee43d1ed7825effa9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a52155c26ba9e9dee43d1ed7825effa9_JaffaCakes118
-
Size
128KB
-
MD5
a52155c26ba9e9dee43d1ed7825effa9
-
SHA1
cf557198c5d31df2e41ad4bf8f298006bb084683
-
SHA256
8db7fab290a4a293f23186e5d569b29dbb701d479078d40aaadf121c91c89c76
-
SHA512
c1f936c510d69285d8fe6e0bfb909c061f89df267d24b6aa9d53eac63c04c2a8a8a0d95bbf719ec9cb295080f076d60513e00fc225474ab769f826ee9ba6ec12
-
SSDEEP
1536:vDZ0Eevwt9G1lzfwL+94t3mPcSiifRlS6hfgmtDu6lkcEoBo:N0EfQoxmPpi0RlSggmtDuakXoBo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a52155c26ba9e9dee43d1ed7825effa9_JaffaCakes118
Files
-
a52155c26ba9e9dee43d1ed7825effa9_JaffaCakes118.dll windows:4 windows x86 arch:x86
1a8407cd9a649491e4d099f0416107b2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
UnmapViewOfFile
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
HeapAlloc
CreateFileMappingA
GlobalMemoryStatus
WaitForMultipleObjects
TerminateProcess
DisconnectNamedPipe
MapViewOfFile
HeapFree
GetLocalTime
GetFileSize
GetSystemDirectoryA
MoveFileExA
CreateEventA
OpenProcess
WriteProcessMemory
GetCurrentProcess
GetFileAttributesA
MoveFileA
SetFilePointer
ReadFile
CreateFileA
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
CreatePipe
GetTickCount
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
OutputDebugStringA
LocalFree
GetDriveTypeA
CreateProcessA
DeleteFileA
GetVersionExA
lstrcmpA
GetPrivateProfileStringA
FreeLibrary
lstrcatA
lstrlenA
Sleep
InterlockedExchange
lstrcpyA
VirtualFree
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
GetProcAddress
LoadLibraryA
TerminateThread
CloseHandle
GetTempPathA
user32
SendMessageA
GetCursorInfo
SetProcessWindowStation
DispatchMessageA
TranslateMessage
CloseDesktop
GetUserObjectInformationA
CreateWindowExA
IsWindow
CloseWindow
GetMessageA
wsprintfA
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
mouse_event
keybd_event
MapVirtualKeyA
EmptyClipboard
OpenClipboard
ReleaseDC
SetRect
GetSystemMetrics
CloseClipboard
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
msvcrt
strncmp
atoi
strncpy
strrchr
_except_handler3
free
malloc
_errno
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
strncat
realloc
wcstombs
_beginthreadex
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strchr
calloc
_strnicmp
_strcmpi
advapi32
InitializeSecurityDescriptor
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegisterServiceCtrlHandlerA
LookupAccountSidA
GetTokenInformation
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
IsValidSid
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
winmm
waveOutOpen
waveInOpen
waveOutUnprepareHeader
waveInUnprepareHeader
ws2_32
ntohs
socket
gethostbyname
recv
select
connect
WSACleanup
send
inet_ntoa
inet_addr
__WSAFDIsSet
htons
closesocket
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
imm32
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
wininet
InternetReadFile
msvfw32
ICSendMessage
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ