Static task
static1
Behavioral task
behavioral1
Sample
a71a63ae1c9f24cdde30186465be4731_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a71a63ae1c9f24cdde30186465be4731_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a71a63ae1c9f24cdde30186465be4731_JaffaCakes118
-
Size
383KB
-
MD5
a71a63ae1c9f24cdde30186465be4731
-
SHA1
528ce5f675e17af467eb3bfa2944913ffdf2e02f
-
SHA256
9f16e156719bf6a9028d92111ec4edc5f81f509a8ff85c2ba9cf731c02733032
-
SHA512
d9235b34bc208f943967176390d47e2535027f7c82fc6b6e0309e977bb144a3f9fba35f654233d28349889d5ce0f31a16a6202738b28e74e970cc2d2a904ac57
-
SSDEEP
6144:uESttnxtOouO5YmCYgtIXFDycyc6zK9F3Tq5JdglnD8H6230FR83ZzCfz8:jSttnxvD5YmCbmXFDycyc6zKPwJdgpDO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a71a63ae1c9f24cdde30186465be4731_JaffaCakes118
Files
-
a71a63ae1c9f24cdde30186465be4731_JaffaCakes118.dll windows:4 windows x86 arch:x86
61ae73823ce30940de80f201164e5322
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualProtect
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
IsBadReadPtr
OpenProcess
WritePrivateProfileStringA
GetPrivateProfileIntA
FindClose
FindNextFileA
FindFirstFileA
IsBadStringPtrA
InterlockedDecrement
InterlockedIncrement
lstrlenA
VirtualQuery
CreateDirectoryA
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetModuleHandleA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
GetCommandLineA
lstrcpynA
GetFileSize
GlobalFree
GlobalReAlloc
InitializeCriticalSection
CreateMutexA
SetFileTime
GetFileTime
SetFileAttributesA
CreateProcessA
GetStartupInfoA
GetWindowsDirectoryA
lstrcpyA
GetVersion
ReadProcessMemory
WideCharToMultiByte
MultiByteToWideChar
lstrcatA
WriteProcessMemory
ExitProcess
TerminateThread
HeapAlloc
GetProcessHeap
Process32Next
Process32First
GetLastError
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
VirtualAllocEx
GetSystemDirectoryA
OpenMutexA
DeviceIoControl
Sleep
WinExec
GetTempFileNameA
GetPrivateProfileStringA
LocalFree
MoveFileA
GetTempPathA
OutputDebugStringA
GetFileAttributesA
CreateFileA
GetTickCount
WriteFile
CloseHandle
ReadFile
SetFilePointer
DeleteFileA
GetModuleFileNameA
GlobalAlloc
CreateThread
user32
wvsprintfA
GetDlgItem
GetKeyboardState
MapVirtualKeyA
VkKeyScanA
ToAscii
SetWindowTextA
GetDlgCtrlID
MessageBoxA
IsWindowVisible
GetParent
GetWindow
GetWindowLongA
GetFocus
SetWindowLongA
GetKeyState
GetForegroundWindow
EnumThreadWindows
GetClassNameA
FindWindowExA
CreateWindowExA
IsWindow
SendMessageA
CallWindowProcA
SetFocus
GetWindowTextA
FindWindowA
GetWindowThreadProcessId
wsprintfA
GetWindowRect
gdi32
CreateFontA
advapi32
DeleteService
RegCloseKey
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CreateServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
ControlService
shell32
StrRStrIA
ole32
OleRun
CoCreateInstance
CoInitialize
oleaut32
GetErrorInfo
VariantInit
VariantClear
SysFreeString
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
shlwapi
PathFileExistsA
msvcrt
wcsncpy
wcslen
wcsstr
_strlwr
strncmp
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strcmpi
_itoa
_strrev
_CxxThrowException
??1type_info@@UAE@XZ
wcstombs
time
rand
isalnum
srand
memchr
_local_unwind2
memmove
isdigit
??2@YAPAXI@Z
__CxxFrameHandler
??3@YAXPAX@Z
free
strtol
strncpy
strstr
strchr
_except_handler3
atoi
_beginthread
strrchr
atol
strncat
sprintf
malloc
iphlpapi
GetAdaptersInfo
msvcp60
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
ws2_32
inet_ntoa
recv
WSARecv
getpeername
htons
connect
WSACleanup
closesocket
send
urlmon
URLDownloadToFileA
netapi32
Netbios
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 273KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inidata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ