Static task
static1
Behavioral task
behavioral1
Sample
aad54cce01df961805293adf1097f117_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aad54cce01df961805293adf1097f117_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
aad54cce01df961805293adf1097f117_JaffaCakes118
-
Size
9KB
-
MD5
aad54cce01df961805293adf1097f117
-
SHA1
687e62eabdd48ccb2ccbf3c4c311372a92f4dc25
-
SHA256
d3de3142698e7da968f56cc415774d2bd896492b43070e9fec2a5dae36292e60
-
SHA512
c2f9219a8a132ac560a31e7b1f87dab1a9e77c2b5b686767704bfef8a0391c9c85ee204b69fedad862fdd463afa7a911707b04896930317f29ade3f59eba2737
-
SSDEEP
96:nZPRdWr9ju6yCqCBXu7YE/E+WrQ8S178WCevxpAtKTNIUqxFjgUHohd1zEILT4YG:Jc1yCHBe7YE/aw5dNwx/ohHzdn4YeAQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aad54cce01df961805293adf1097f117_JaffaCakes118
Files
-
aad54cce01df961805293adf1097f117_JaffaCakes118.dll windows:4 windows x86 arch:x86
1cc681cd43fd7a11770e28dbd59fffa6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_except_handler3
_adjust_fdiv
malloc
_initterm
free
??1type_info@@UAE@XZ
??3@YAXPAX@Z
__CxxFrameHandler
??2@YAPAXI@Z
_strcmpi
kernel32
GetWindowsDirectoryA
MoveFileA
GetLastError
TerminateProcess
OpenProcess
DeleteFileA
SetLastError
lstrcpyA
LoadLibraryA
GetProcAddress
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentProcess
CloseHandle
lstrcatA
lstrlenA
GetPrivateProfileStringA
user32
wsprintfA
advapi32
OpenServiceA
StartServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegSaveKeyA
RegRestoreKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ