WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
a69a6bbc5152e7de113ef008a165e47d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a69a6bbc5152e7de113ef008a165e47d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a69a6bbc5152e7de113ef008a165e47d_JaffaCakes118
-
Size
54KB
-
MD5
a69a6bbc5152e7de113ef008a165e47d
-
SHA1
e9415a7dc689acadcfd03f6c09526fca7b6ceea9
-
SHA256
592f89864116dc68c8671b8a3dffd543bb008218885c16e4d1ca0de3085a0b1a
-
SHA512
bfea5270f2d88c2f20a768ead7ce3d829afd30fef982f042814643125b79ada9d203ed3833a21fa448aa2af27db4f6bd4dda87f14f1fa1a64d72794821606c07
-
SSDEEP
768:nDRki680OFPOXagxbWz2CqiScWS0MFvGANQRHCe4nERTBch4uzk04sL9UYA4ha5N:Dh0OJOXagPCd2MeCe1Vm7I7d+8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a69a6bbc5152e7de113ef008a165e47d_JaffaCakes118
Files
-
a69a6bbc5152e7de113ef008a165e47d_JaffaCakes118.dll windows:4 windows x86 arch:x86
7959b4fa05a750902e24e09b56b127bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord1980
ord2770
ord356
ord5683
ord2614
ord924
ord2784
ord668
ord6876
ord5710
ord4129
ord860
ord1615
ord5773
ord5442
ord939
ord536
ord4204
ord665
ord354
ord958
ord5186
ord539
ord2764
ord4202
ord940
ord825
ord3811
ord3337
ord923
ord5603
ord1105
ord6140
ord2061
ord858
ord4277
ord922
ord538
ord5572
ord2915
ord5858
ord537
ord341
ord654
ord540
ord2818
ord535
ord800
ord610
ord287
ord3575
ord5812
ord6394
ord6383
ord5440
ord5450
ord6139
ord823
ord2107
ord3663
ord2841
msvcrt
_adjust_fdiv
malloc
_initterm
free
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
__CxxFrameHandler
memmove
_access
exit
_mbscmp
_purecall
_mbsicmp
kernel32
SetLastError
GetModuleHandleA
GetVolumeInformationA
SetFileAttributesA
MoveFileExA
GetModuleFileNameA
OutputDebugStringA
ExpandEnvironmentStringsA
GetCurrentThreadId
GlobalFree
GlobalAlloc
ReleaseMutex
CloseHandle
CreateMutexA
WriteProcessMemory
IsBadReadPtr
GetCurrentDirectoryA
GetCurrentProcessId
Sleep
GetLastError
CreateFileA
GetProcAddress
DeleteFileA
FreeLibrary
MoveFileA
GetTickCount
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetTempPathA
GetSystemDirectoryA
SetFileTime
GetFileAttributesA
GetFileAttributesExA
OpenMutexA
WriteFile
LoadLibraryA
LeaveCriticalSection
GetTempFileNameA
ws2_32
send
recv
WSADuplicateSocketA
select
WSASocketA
WSAStartup
WSCEnumProtocols
WSCGetProviderPath
bind
inet_addr
htonl
gethostname
socket
connect
gethostbyname
ntohs
getpeername
getsockname
accept
closesocket
htons
__WSAFDIsSet
imagehlp
MapFileAndCheckSumA
Exports
Exports
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ