dbg1sym2.p1d1b
Static task
static1
Behavioral task
behavioral1
Sample
a9bd26e16f31890976759012dd0c9603_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a9bd26e16f31890976759012dd0c9603_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a9bd26e16f31890976759012dd0c9603_JaffaCakes118
-
Size
156KB
-
MD5
a9bd26e16f31890976759012dd0c9603
-
SHA1
5a304f0933b7a9891f368485e92fd0fd06103c72
-
SHA256
42f6cc80832423ff7b941faee7920d66b92ae98d12a6aaca7fce4bf057215c12
-
SHA512
248415cdce2d127a3ce48d6a3bf628e9aa5538111bb1916ce09514d65559b9aaf847d96ec5e7b190775661d13bdd58f85aa536def5624ac3d7bfa64fea462ca7
-
SSDEEP
3072:d8I79z+YQ9HKPm0DcEyCsEcIP4V2ec7yPjJhZqWj7:SYkHKPmMcEy0OGUJDqE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9bd26e16f31890976759012dd0c9603_JaffaCakes118
Files
-
a9bd26e16f31890976759012dd0c9603_JaffaCakes118.dll windows:4 windows x86 arch:x86
79fc9ca2324d334e8839401d05ffb970
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
ResetEvent
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSection
lstrcpyW
lstrcatW
SetLastError
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetLastError
FreeEnvironmentStringsA
GetProcAddress
LoadLibraryExW
Sleep
InterlockedCompareExchange
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
IsBadCodePtr
IsBadReadPtr
VirtualQuery
IsBadWritePtr
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
HeapSize
HeapReAlloc
HeapAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
InterlockedExchangeAdd
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
InterlockedDecrement
GetModuleFileNameA
GetStdHandle
WriteFile
GetModuleHandleA
RaiseException
RtlUnwind
GetVersionExA
GetCommandLineA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateNamedPipeA
ConnectNamedPipe
ReadFile
DisconnectNamedPipe
CreateTimerQueueTimer
CreateEventA
CreateThread
WaitForMultipleObjects
InterlockedExchange
DeleteTimerQueueTimer
ExitProcess
GetCurrentProcessId
InterlockedIncrement
GetCurrentProcess
DuplicateHandle
CloseHandle
OpenProcess
SetEvent
MoveFileA
CreateMutexW
GetStartupInfoA
ReleaseMutex
user32
wsprintfW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Exports
Exports
sfph
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 804B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ