Static task
static1
Behavioral task
behavioral1
Sample
a6e2f9985a669721c957efdb1d807adc_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a6e2f9985a669721c957efdb1d807adc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a6e2f9985a669721c957efdb1d807adc_JaffaCakes118
-
Size
108KB
-
MD5
a6e2f9985a669721c957efdb1d807adc
-
SHA1
81dbb470f5eb362fa404a1ac99fd1b5310414861
-
SHA256
efbeddbac949417e36e5eb563aac819b64b0c49cf1716a466384d8d1086da9b0
-
SHA512
84c80cae75a916eb7306d31f650ad410535a92b6d99dd0c490459842f686cce913f2b69b491366b427dae3843a435a2329a7c7a9014ac3c74bcdce4ab6bc2397
-
SSDEEP
1536:RFpxmvkHla++3t+q/EWwnbo2ORzF8jEybX6096jh+Fo7+iBYaSubQQU2hBZgaAUu:D3msHl43Z/EBkw2pTyQUyBZgWQ2A9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6e2f9985a669721c957efdb1d807adc_JaffaCakes118
Files
-
a6e2f9985a669721c957efdb1d807adc_JaffaCakes118.dll windows:4 windows x86 arch:x86
f8ff9155e1b13f388c1f56c757b5e9a2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualProtectEx
GetSystemDirectoryA
VirtualFree
GetModuleHandleA
SizeofResource
GetModuleFileNameA
LoadResource
SetLastError
FindResourceA
CreateMutexA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
FreeLibraryAndExitThread
Sleep
DisableThreadLibraryCalls
CreateThread
VirtualAlloc
GetThreadContext
ReadProcessMemory
VirtualQueryEx
GetCurrentProcessId
ProcessIdToSessionId
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
LockResource
CloseHandle
advapi32
LookupAccountSidA
BuildExplicitAccessWithNameA
GetKernelObjectSecurity
GetSecurityDescriptorDacl
SetEntriesInAclA
MakeAbsoluteSD
SetSecurityDescriptorDacl
SetKernelObjectSecurity
ImpersonateLoggedOnUser
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTokenInformation
msvcrt
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
malloc
sprintf
free
_initterm
_adjust_fdiv
_strnicmp
_stricmp
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 954B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ