WindowsExplr
Static task
static1
Behavioral task
behavioral1
Sample
b03ba201181b6114becb51804bf5bc33_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b03ba201181b6114becb51804bf5bc33_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b03ba201181b6114becb51804bf5bc33_JaffaCakes118
-
Size
83KB
-
MD5
b03ba201181b6114becb51804bf5bc33
-
SHA1
e0a9c6c367ddebb3360d2c56815f431bbe0092e5
-
SHA256
5b2285b42d45176e3fd303dddd85522d1e4bde7da84a57f5c597fe4239f477b3
-
SHA512
8f3151883b7df9bd57a0ab56a17409de5184a9b0fff541609ec74d8a2024529abcdd173741650df3069673ca6bdfe7540b6cb311584d876cd81a1a34946b682c
-
SSDEEP
1536:HT59fnesCImIU55JVuv4hK/knGGTL0lGnwFrEXcCBRf6EUgU9uVO/BvIuRJPshy:H1Asro5Jcv2K/kWFgXBBB6EUj9uVO/Bj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b03ba201181b6114becb51804bf5bc33_JaffaCakes118
Files
-
b03ba201181b6114becb51804bf5bc33_JaffaCakes118.dll windows:4 windows x86 arch:x86
ceb30cd41ee19dbafabd4542a8e7c354
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
GetTickCount
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
OpenProcess
Process32Next
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetCurrentProcess
GetSystemDirectoryA
MoveFileExA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
FreeLibrary
GetDiskFreeSpaceExA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
GetProcAddress
CreateEventA
LoadLibraryA
GetModuleHandleA
WaitForMultipleObjects
user32
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
LoadCursorA
GetDesktopWindow
ReleaseDC
keybd_event
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
IsWindow
CloseWindow
SystemParametersInfoA
SendMessageA
BlockInput
UnhookWindowsHookEx
DispatchMessageA
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetCursorPos
DestroyCursor
GetDC
GetActiveWindow
TranslateMessage
GetMessageA
CharNextA
wsprintfA
GetWindowTextA
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteObject
CreateCompatibleDC
SelectObject
DeleteDC
CreateDIBSection
advapi32
RegOpenKeyA
RegCreateKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteValueA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegEnumValueA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
RegDeleteKeyA
shell32
SHGetFileInfoA
msvcrt
_strnicmp
strtok
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
atoi
realloc
strncat
strchr
strncpy
strcat
strcpy
strcmp
strrchr
_except_handler3
malloc
free
_CxxThrowException
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
winmm
waveOutPrepareHeader
waveOutOpen
waveInGetNumDevs
waveInStart
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveOutGetNumDevs
waveOutWrite
ws2_32
htons
connect
setsockopt
WSACleanup
WSAStartup
socket
closesocket
ntohs
recv
select
send
gethostname
getsockname
gethostbyname
WSAIoctl
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
avicap32
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
psapi
GetModuleFileNameExA
EnumProcessModules
Exports
Exports
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ