RunDllEntry
Static task
static1
Behavioral task
behavioral1
Sample
a79ba17784e0183120cee6dfbf49e476_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a79ba17784e0183120cee6dfbf49e476_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a79ba17784e0183120cee6dfbf49e476_JaffaCakes118
-
Size
389KB
-
MD5
a79ba17784e0183120cee6dfbf49e476
-
SHA1
b45063e20af3c6f739ac8c8a396d8c0515eebe63
-
SHA256
aafbf4bba99c47e7d05c951ad964ce09493db091ba5945e89df916c6fa95d101
-
SHA512
c2b80aeb22589acd5802bb7968d1df4af450652358f40bcf381cfcb5680a31eeb8551977216b4092966e46b77e77229756ae07b86b68ccd25068accc8ada2ea4
-
SSDEEP
6144:kGJLj6p7BLYBq0AY0oiRWO2ihhM40hAJD19M+LSZ:kuj6pNLMqh5oiR2ihghMNSZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a79ba17784e0183120cee6dfbf49e476_JaffaCakes118
Files
-
a79ba17784e0183120cee6dfbf49e476_JaffaCakes118.dll windows:5 windows x86 arch:x86
af9205f15cd9a2c549afbb8599796b15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAllocEx
WriteProcessMemory
GetLastError
ResumeThread
WaitForSingleObject
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
GetModuleFileNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CopyFileW
GetEnvironmentVariableW
GetTempFileNameW
DeleteFileW
FormatMessageA
LocalFree
CloseHandle
WaitNamedPipeW
CreateNamedPipeW
ConnectNamedPipe
CreateFileW
ReadFile
WriteFile
CreateRemoteThread
OpenProcess
GetVersion
LoadLibraryW
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEndOfFile
FindClose
FindFirstFileW
FindNextFileW
SetLastError
FreeLibrary
GetModuleHandleA
AreFileApisANSI
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
ExitProcess
RaiseException
RtlUnwind
GetStringTypeW
GetCPInfo
LCMapStringA
LCMapStringW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointer
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetTimeZoneInformation
GetProcessHeap
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateThread
Sleep
wininet
InternetCloseHandle
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
ole32
CoCreateGuid
Exports
Exports
Sections
.text Size: 293KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ