fxGLPath
Static task
static1
Behavioral task
behavioral1
Sample
ad28f0cbd03c53876add30f2efecd3c5_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad28f0cbd03c53876add30f2efecd3c5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ad28f0cbd03c53876add30f2efecd3c5_JaffaCakes118
-
Size
152KB
-
MD5
ad28f0cbd03c53876add30f2efecd3c5
-
SHA1
c4d006d44be370b30caec6223c956c1dd0ab7153
-
SHA256
a36d165bef2749aea6d1084e12544ccfb9d5d63561eac319003af3a6aadc90dc
-
SHA512
b1adfa6b80969be89a40743efa39042fb64429605c55111ee19a87c6bfc84c88f81017f8deb2ffaf8e1caf59a471765baba7d8612d1e81e5655a1ad201972bf3
-
SSDEEP
3072:mrR4gm+sqNuphkhwUHhwub+p898IyGUrKPVJT1GZgT1o+t:jgl9sFUeuy8Ur6xhTVt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad28f0cbd03c53876add30f2efecd3c5_JaffaCakes118
Files
-
ad28f0cbd03c53876add30f2efecd3c5_JaffaCakes118.dll windows:4 windows x86 arch:x86
f277dd9cb26209e648bd0ca5227444bb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcessHeap
ExitProcess
CreateFileMappingA
GlobalFree
LeaveCriticalSection
GetProcAddress
ReadProcessMemory
CopyFileA
GetModuleHandleA
CreateFileA
HeapFree
GetTickCount
WriteProcessMemory
OpenFileMappingA
WriteFile
GetComputerNameA
OpenEventA
SetLastError
InterlockedIncrement
TerminateProcess
EnterCriticalSection
GetVolumeInformationA
InterlockedDecrement
LoadLibraryA
LocalFree
GetCurrentProcess
CreateMutexW
WaitForSingleObject
GetCommandLineA
GetLastError
GlobalAlloc
MapViewOfFile
CreateDirectoryA
GetModuleFileNameA
InterlockedCompareExchange
HeapAlloc
CreateEventA
Sleep
UnmapViewOfFile
CloseHandle
CreateProcessA
ole32
OleCreate
CoUninitialize
CoCreateGuid
OleSetContainedObject
CoInitialize
CoCreateInstance
CoSetProxyBlanket
CoTaskMemAlloc
user32
FindWindowA
PeekMessageA
GetSystemMetrics
ClientToScreen
PostQuitMessage
SetTimer
GetMessageA
DispatchMessageA
RegisterWindowMessageA
DestroyWindow
ScreenToClient
KillTimer
GetWindowLongA
GetParent
SetWindowLongA
DefWindowProcA
GetClassNameA
GetWindow
CreateWindowExA
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowThreadProcessId
TranslateMessage
GetCursorPos
SendMessageA
oleaut32
SysAllocStringLen
SysStringLen
SysAllocString
SysFreeString
shlwapi
StrStrIW
UrlUnescapeW
advapi32
GetUserNameA
RegDeleteValueA
RegCreateKeyExA
OpenProcessToken
DuplicateTokenEx
RegSetValueExA
SetTokenInformation
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 953B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ