LOAD
Static task
static1
Behavioral task
behavioral1
Sample
ab6606127e0a532350d99b43d10de82a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab6606127e0a532350d99b43d10de82a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ab6606127e0a532350d99b43d10de82a_JaffaCakes118
-
Size
248KB
-
MD5
ab6606127e0a532350d99b43d10de82a
-
SHA1
6c4ec5fb0627df878bf394545421b6d268e6ce3b
-
SHA256
63d2ebc6a0b7037dd53464210e255f5b43f1d82a7e2b21ca803c95377fba6db8
-
SHA512
bc430d3bc164481866055472a7030ae8089b30dcb63425f7813d7037dd44bc1cc5d8c1b37ec69e68463656af42b891ad5a490203b1b308f609a53f9e95b39e43
-
SSDEEP
3072:mXx+HWgZQQdGonnCwN/s9O+uDK6s6XcaDTE7Ng1A90bToiRoBr7bVyW+q:2kQQdGdc/sWe6secOK/o5Ero9q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab6606127e0a532350d99b43d10de82a_JaffaCakes118
Files
-
ab6606127e0a532350d99b43d10de82a_JaffaCakes118.dll windows:4 windows x86 arch:x86
de9d913121a52a6a88b6b4306a773c7b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalFlags
WritePrivateProfileStringA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetCommandLineA
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
RaiseException
HeapSize
HeapReAlloc
GetACP
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
LoadLibraryA
GetProcAddress
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetLastError
GetVersion
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
GetLocalTime
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LocalFree
SetLastError
FreeLibrary
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
VirtualQueryEx
VirtualProtectEx
WriteProcessMemory
GetWindowsDirectoryA
SetFileAttributesA
GetModuleHandleA
GetModuleFileNameA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
GetFileAttributesA
lstrlenA
Beep
CloseHandle
GetCurrentProcess
CreateThread
GetTickCount
Sleep
GetStdHandle
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
SetWindowTextA
ShowWindow
GetClassNameA
PtInRect
LoadCursorA
GetSysColorBrush
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
wsprintfA
LoadStringA
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
GetActiveWindow
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
SetCursor
PostQuitMessage
CopyRect
GetClientRect
GetDC
PeekMessageA
DispatchMessageA
PostMessageA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
MessageBoxA
GetKeyState
GetWindowDC
ReleaseDC
DefWindowProcA
SendMessageA
SetTimer
KillTimer
GetMenuState
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetDeviceCaps
PtVisible
RectVisible
ExtTextOutA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
TextOutA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
wsock32
gethostbyname
gethostname
ntohs
inet_addr
getpeername
WSASetLastError
accept
ioctlsocket
WSACleanup
htons
htonl
closesocket
recv
send
WSAAsyncSelect
inet_ntoa
socket
recvfrom
sendto
connect
WSAStartup
WSAGetLastError
listen
shutdown
bind
wininet
InternetReadFile
InternetOpenUrlA
InternetCanonicalizeUrlA
InternetGetConnectedState
InternetOpenA
InternetCloseHandle
Exports
Exports
Sections
.text Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ