Static task
static1
Behavioral task
behavioral1
Sample
af2ba45f850693a11587ab1812243488_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
af2ba45f850693a11587ab1812243488_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
af2ba45f850693a11587ab1812243488_JaffaCakes118
-
Size
90KB
-
MD5
af2ba45f850693a11587ab1812243488
-
SHA1
ecfd6eb51a2a7f9762c8bf7e29551cde739a6ccb
-
SHA256
067e3edd1aedc9a3f0c38e6b7e1a39a1a04e305008c068b146bda112bc1eef20
-
SHA512
8c4d5277718727122a48feebf69bd862271aa931bd227d86d0b195d49b6a5c5e9c105d7d3c62a0982c80b175f31e063814aadcd1bfeb587fbe54261ce8161a7d
-
SSDEEP
1536:EFkXweqb3f5e+3E/XXWWr44rRz/ZWzEybHy0NyThe14jGiRtV6Vj8gYY2K/20stI:+kXwD3n3sXXtFjWOZ97ZY1/20zQ4Vf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af2ba45f850693a11587ab1812243488_JaffaCakes118
Files
-
af2ba45f850693a11587ab1812243488_JaffaCakes118.dll windows:4 windows x86 arch:x86
f8ff9155e1b13f388c1f56c757b5e9a2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualProtectEx
GetSystemDirectoryA
VirtualFree
GetModuleHandleA
SizeofResource
GetModuleFileNameA
LoadResource
SetLastError
FindResourceA
CreateMutexA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
FreeLibraryAndExitThread
Sleep
DisableThreadLibraryCalls
CreateThread
VirtualAlloc
GetThreadContext
ReadProcessMemory
VirtualQueryEx
GetCurrentProcessId
ProcessIdToSessionId
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
LockResource
CloseHandle
advapi32
LookupAccountSidA
BuildExplicitAccessWithNameA
GetKernelObjectSecurity
GetSecurityDescriptorDacl
SetEntriesInAclA
MakeAbsoluteSD
SetSecurityDescriptorDacl
SetKernelObjectSecurity
ImpersonateLoggedOnUser
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTokenInformation
msvcrt
memmove
??2@YAPAXI@Z
??3@YAXPAX@Z
malloc
sprintf
free
_initterm
_adjust_fdiv
_strnicmp
_stricmp
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 966B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ