Static task
static1
Behavioral task
behavioral1
Sample
a6925f4e17b512fb7a7b8b0e0cec5293_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a6925f4e17b512fb7a7b8b0e0cec5293_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a6925f4e17b512fb7a7b8b0e0cec5293_JaffaCakes118
-
Size
252KB
-
MD5
a6925f4e17b512fb7a7b8b0e0cec5293
-
SHA1
c03aa8b6e756e82eb039b8cd05e90b9a867dd023
-
SHA256
04ea7a57c741695131c4c5fd16d607a64a7ec034bcb7b557b84eb2ee56102c71
-
SHA512
bba5f7cfe55ae6564ab1be2a828b6ef43d4a2f6a6047b11c186e9b561e43d7e84e2aacf0bb830283e6d45d90cea1620a7ce1285b1b3d2373fbc413d47da8e3da
-
SSDEEP
3072:H2nc8Ofx1MbxTaamX4uCanKGGlk6N8EKxDDFHDH+kwoA6YbwWWuVZwmfbGly4jtT:igJwoBi3XbGly4j83Hzm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6925f4e17b512fb7a7b8b0e0cec5293_JaffaCakes118
Files
-
a6925f4e17b512fb7a7b8b0e0cec5293_JaffaCakes118.dll windows:4 windows x86 arch:x86
9392fb874ee69fc5ac4d0fcd79ae0094
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
CloseHandle
GetSystemTime
CreateEventW
WaitForSingleObject
MultiByteToWideChar
CreateFileW
LoadLibraryW
GetCurrentDirectoryW
SetFilePointer
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileAttributesW
WideCharToMultiByte
CreateDirectoryW
WriteFile
SetFileTime
GetProcAddress
FindClose
ReadFile
FindFirstFileW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
CreateFileA
advapi32
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
Sections
.text Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ