_3OK7Od
Static task
static1
Behavioral task
behavioral1
Sample
b2f0b583aac51e3ea6e8413c55c33ea1_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b2f0b583aac51e3ea6e8413c55c33ea1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b2f0b583aac51e3ea6e8413c55c33ea1_JaffaCakes118
-
Size
176KB
-
MD5
b2f0b583aac51e3ea6e8413c55c33ea1
-
SHA1
f9146f24cd528c7ab95469a311c7c0a0dd8374dd
-
SHA256
dca75677f817825e5da986501c9f5f9c7968c4d5a4fd42946c72673f8323eb67
-
SHA512
feaf7345459a0546e7872e700dd577b7698771b524f8638c9031ceb5c4f86787804a982223e716c2e9e31b12318e93549ff85a333ae9f83d848c5c22870f6367
-
SSDEEP
3072:jSR8G+xzYFo61bNuZVvWfMEgq6fG69mOGMoxPRvSNbKZAJX+TQ8Ag53ku:jujMMFoeNuZVuf2q6G6LuKKZA0TQQ9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2f0b583aac51e3ea6e8413c55c33ea1_JaffaCakes118
Files
-
b2f0b583aac51e3ea6e8413c55c33ea1_JaffaCakes118.dll windows:4 windows x86 arch:x86
288ccff20833f3bac354723800daa58a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
oleaut32
SysReAllocStringLen
SysFreeString
SafeArrayPtrOfIndex
SysStringLen
SafeArrayCreate
SafeArrayGetElement
user32
OpenClipboard
RemoveMenu
CreateIcon
IsWindowUnicode
GetClientRect
GetFocus
RemovePropA
SetRect
GetKeyboardLayout
SendMessageW
GetSysColorBrush
EnumThreadWindows
GetKeyboardLayoutList
IsChild
DrawFrameControl
GetWindowThreadProcessId
IsWindowEnabled
OpenIcon
GetClassNameA
InsertMenuItemA
EmptyClipboard
LoadKeyboardLayoutA
GetScrollRange
GetWindowRect
PostQuitMessage
GetMenuStringA
IntersectRect
SystemParametersInfoA
GetDC
ActivateKeyboardLayout
GetKeyNameTextA
GetMessagePos
FindWindowA
SetClassLongA
FillRect
IsCharLowerA
LoadCursorA
GetMenu
GetKeyState
DrawTextA
ShowOwnedPopups
SetWindowTextA
TrackPopupMenu
SetTimer
DefFrameProcA
InvalidateRect
DrawEdge
SendMessageA
ChildWindowFromPoint
IsCharUpperA
IsWindowVisible
CreatePopupMenu
GetSubMenu
GetScrollPos
SetActiveWindow
SetWindowsHookExA
SetClipboardData
GetMenuItemID
IsWindow
SetWindowLongA
GetDlgItem
MsgWaitForMultipleObjects
DrawMenuBar
GetCursorPos
EnumChildWindows
SetScrollRange
CharUpperBuffA
CallWindowProcA
GetLastActivePopup
PeekMessageW
CreateWindowExA
UnregisterClassA
GetKeyboardType
SetWindowLongW
SetPropA
MapVirtualKeyA
PostMessageA
DispatchMessageA
GetDCEx
GetScrollInfo
RegisterClipboardFormatA
SetScrollInfo
ScreenToClient
ClientToScreen
SetForegroundWindow
GetPropA
GetWindowLongA
IsDlgButtonChecked
MessageBoxA
GetForegroundWindow
DestroyWindow
MessageBeep
kernel32
GetOEMCP
GetModuleHandleA
ExitProcess
VirtualAlloc
GetProcessHeap
GetThreadLocale
LoadLibraryA
GetProcAddress
shlwapi
SHQueryInfoKeyA
SHDeleteKeyA
PathIsContentTypeA
SHQueryValueExA
SHSetValueA
msvcrt
swprintf
_acmdln
wcsncmp
time
calloc
wcschr
atol
memcpy
rand
tolower
sqrt
shell32
Shell_NotifyIconW
SHGetFileInfoA
advapi32
RegEnumKeyExA
comctl32
ImageList_Create
ImageList_Add
ImageList_Read
ole32
CoDisconnectObject
CLSIDFromProgID
PropVariantClear
CoReleaseMarshalData
WriteClassStm
gdi32
SetBkMode
GetBkColor
Exports
Exports
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 152KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
.data
-
.rdata
-
.reloc
-
.rsrc/0/DIALOG/TEXTFILEDLG
-
.rsrc/0/MANIFEST/1.xml
-
.rsrc/0/RCDATA/DVCLAL
-
.rsrc/0/STRING/4094
-
.rsrc/0/STRING/4095
-
.rsrc/1033/BITMAP/BBABORT.bmp
-
.rsrc/1033/version.txt
-
.text