Static task
static1
Behavioral task
behavioral1
Sample
ac85dbaab108413c516e2ccb3a510a13_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac85dbaab108413c516e2ccb3a510a13_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ac85dbaab108413c516e2ccb3a510a13_JaffaCakes118
-
Size
133KB
-
MD5
ac85dbaab108413c516e2ccb3a510a13
-
SHA1
fe085a34b7566b450dc639ea97f4e44f07bd1bcc
-
SHA256
4fafd7dbcb3a03334a4017aadc1fced06675c1ebe5f3f0aad0a749961f73b5b7
-
SHA512
7a0799d7f26d060179d796f10138a47340214f30555b1434ad036a9027e31bfff03f21986d57893a4d1bb2024f3fc6309701613d350f980e4140059848949a30
-
SSDEEP
3072:k/VUmEVAcR4enPgAJ+b935g2elSMqqDLy/s5kS:k/O6cR4ePqxJCqqDLu4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac85dbaab108413c516e2ccb3a510a13_JaffaCakes118
Files
-
ac85dbaab108413c516e2ccb3a510a13_JaffaCakes118.dll windows:4 windows x86 arch:x86
7dbb16bfb34a36a27c32bcc82ccccf49
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetSystemWindowsDirectoryW
CreateMutexW
ProcessIdToSessionId
lstrlenW
WideCharToMultiByte
GetModuleHandleW
ResetEvent
GlobalAlloc
DnsHostnameToComputerNameW
GetTempFileNameW
GetTempPathW
GetFileSize
InterlockedDecrement
HeapDestroy
HeapCreate
GetModuleHandleA
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetSystemInfo
CreateFileMappingW
CreateEventW
CreateThread
SetEvent
LoadLibraryExW
CloseHandle
GetCurrentProcessId
CreateProcessW
lstrcmpW
LocalFree
DisableThreadLibraryCalls
InitializeCriticalSectionAndSpinCount
GetSystemDirectoryW
GetModuleFileNameW
LoadLibraryW
GetProcAddress
FreeLibrary
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapReAlloc
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
GetLocaleInfoA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
InterlockedCompareExchange
ReleaseMutex
WaitForSingleObject
GetTickCount
GetVersionExW
LoadLibraryA
VirtualAlloc
VirtualFree
CreateFileW
LocalAlloc
GetCommandLineA
WriteFile
VirtualProtect
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapFree
GetModuleFileNameA
GetStartupInfoA
RtlUnwind
GetVersionExA
InterlockedExchange
VirtualQuery
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
user32
PostMessageW
GetWindow
GetLastActivePopup
EnableWindow
TranslateMessage
DispatchMessageW
PeekMessageW
SetForegroundWindow
SetFocus
FindWindowW
GetUserObjectInformationW
GetProcessWindowStation
LoadStringW
GetMessageW
SendNotifyMessageW
MessageBoxW
MsgWaitForMultipleObjects
advapi32
RegisterEventSourceW
RegCreateKeyExW
RegDeleteValueW
DeregisterEventSource
ReportEventW
RegCloseKey
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
gdi32
DeleteDC
GetDeviceCaps
CreateDCW
rpcrt4
NdrClientCall2
RpcMgmtIsServerListening
RpcStringFreeW
RpcSmDestroyClientContext
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcBindingSetAuthInfoExW
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ