Static task
static1
Behavioral task
behavioral1
Sample
aa26e11deda187d69d7c9bc63a3bfa77_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aa26e11deda187d69d7c9bc63a3bfa77_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
aa26e11deda187d69d7c9bc63a3bfa77_JaffaCakes118
-
Size
40KB
-
MD5
aa26e11deda187d69d7c9bc63a3bfa77
-
SHA1
e6e14814da474edfee95a9851b08fc118528ea82
-
SHA256
48d6f3cddcdc86133a60f02aa02e85130b82c58097534ab65a0db5548fa8f72c
-
SHA512
3005673b7bf2806520ffa3e4102d23fe826646cba7653faf002507bebde95db3960d6cbf36d3e51b71a65bda7ac2d9fa50a2cbacd23eb56ac688d21821cc766c
-
SSDEEP
768:pysw2KeIW90DZqKzK7u7eIfTCws6VpraH:prwYT4KyeGTCwP2H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa26e11deda187d69d7c9bc63a3bfa77_JaffaCakes118
Files
-
aa26e11deda187d69d7c9bc63a3bfa77_JaffaCakes118.dll windows:4 windows x86 arch:x86
522cdf438a99629fd54bcdbc617f0061
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalMemoryStatus
GetComputerNameA
CreateEventA
ResetEvent
TerminateThread
ExitThread
WinExec
FindNextFileA
GetLastError
FindClose
FindFirstFileA
SetCurrentDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetDriveTypeA
GetTempFileNameA
GetTempPathA
RemoveDirectoryA
GetCurrentDirectoryA
GetWindowsDirectoryA
TerminateProcess
OpenProcess
VirtualProtectEx
GetModuleFileNameA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetSystemInfo
GetVersionExA
GetProcessHeap
LoadLibraryA
GetProcAddress
HeapAlloc
HeapFree
CreateThread
Sleep
SetConsoleCtrlHandler
GetModuleHandleA
GetLocalTime
SetFilePointer
GetFileSize
SetEvent
GetCurrentThreadId
GetFileTime
WriteFile
SetFileTime
CreateFileA
ReadFile
GetSystemDirectoryA
CopyFileA
CreateProcessA
WaitForSingleObject
CloseHandle
MoveFileA
DeleteFileA
user32
SetCursorPos
keybd_event
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
GetKeyState
PostThreadMessageA
GetKeyNameTextA
GetWindowTextA
GetForegroundWindow
CallNextHookEx
mouse_event
SetTimer
GetDC
ReleaseDC
KillTimer
CloseWindowStation
CloseDesktop
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
SetWindowsHookExA
gdi32
LineTo
MoveToEx
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
CreateDCA
GetDeviceCaps
DeleteObject
CreatePen
DeleteDC
advapi32
AdjustTokenPrivileges
ControlService
LookupPrivilegeValueA
OpenProcessToken
StartServiceA
ChangeServiceConfigA
OpenServiceA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
GetUserNameA
RegOpenKeyExA
DeleteService
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
send
WSAStartup
gethostbyname
htons
WSASocketA
connect
closesocket
select
recv
urlmon
URLDownloadToFileA
msvcrt
??3@YAXPAX@Z
memcpy
memset
??2@YAPAXI@Z
atoi
strcpy
_strupr
strstr
strcat
strlen
__CxxFrameHandler
strcmp
memcmp
wcslen
free
_initterm
malloc
_adjust_fdiv
_itoa
_wcsupr
sprintf
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ