sminetmon2
Static task
static1
Behavioral task
behavioral1
Sample
b0e83c8503a5e3e0108358b264612d12_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0e83c8503a5e3e0108358b264612d12_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b0e83c8503a5e3e0108358b264612d12_JaffaCakes118
-
Size
132KB
-
MD5
b0e83c8503a5e3e0108358b264612d12
-
SHA1
aa72ab5b0b616919dc3289835b2028abf632b9db
-
SHA256
25ae09d759badcb10438914d85bd8016bb9c50a4057902bd5c18df3c87f20c2f
-
SHA512
544f9c0a344512946486daf047a9d89aec53927ac27f67f09563be2756d4798dfb5d85242df9d78523ff50b78fc853493faace0ebeef229587f1cad1b6041ef6
-
SSDEEP
3072:CMbR1dtvnP4Ln9128YWCwy6eQ0ZscOs7dcgQMU:plTtvPo91ayWDOsygQMU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0e83c8503a5e3e0108358b264612d12_JaffaCakes118
Files
-
b0e83c8503a5e3e0108358b264612d12_JaffaCakes118.dll windows:4 windows x86 arch:x86
35cc4a201639f62d0c210c5a83cc7509
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CreateMutexW
WaitForSingleObject
GetModuleFileNameA
SetLastError
GlobalAlloc
LeaveCriticalSection
GetLastError
EnterCriticalSection
GetModuleHandleA
GetCommandLineA
TerminateProcess
GetTickCount
WriteProcessMemory
HeapFree
HeapAlloc
CreateEventA
Sleep
WriteFile
LoadLibraryA
ReadProcessMemory
ExitProcess
GlobalFree
CreateFileA
CreateFileMappingA
CreateProcessA
LocalFree
OpenFileMappingA
MapViewOfFile
GetProcAddress
GetComputerNameA
CreateDirectoryA
InterlockedCompareExchange
InterlockedIncrement
InterlockedDecrement
CopyFileA
GetProcessHeap
OpenEventA
UnmapViewOfFile
GetVolumeInformationA
GetCurrentProcess
ole32
CoTaskMemAlloc
CoUninitialize
CoCreateGuid
CoInitialize
OleSetContainedObject
CoSetProxyBlanket
OleCreate
CoCreateInstance
user32
DestroyWindow
GetParent
PeekMessageA
GetCursorPos
SetTimer
GetSystemMetrics
ScreenToClient
GetWindowThreadProcessId
CreateWindowExA
KillTimer
SetWindowLongA
DefWindowProcA
GetWindowLongA
TranslateMessage
ClientToScreen
SetWindowsHookExA
PostQuitMessage
GetClassNameA
SendMessageA
UnhookWindowsHookEx
DispatchMessageA
GetWindow
FindWindowA
GetMessageA
RegisterWindowMessageA
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocString
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
GetUserNameA
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
RegQueryValueExA
RegDeleteKeyA
RegSetValueExA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ