Static task
static1
Behavioral task
behavioral1
Sample
b3bc1969468988005d283a4004d5063b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b3bc1969468988005d283a4004d5063b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b3bc1969468988005d283a4004d5063b_JaffaCakes118
-
Size
156KB
-
MD5
b3bc1969468988005d283a4004d5063b
-
SHA1
f82424c7525e0db4559a4d8c1905a666a831c271
-
SHA256
06b526aba0ec9a67d6f6d685d8988cfd32706774df29ff2a0aede151695a9879
-
SHA512
2a553f5188f9034f53d2cd03fc34687cf564336d6f6cf12e03eeb2fda86a1106575f8f09a573f507eeef54df7cb16274085e77fa4c2fcd74e91d7b4c121bbb49
-
SSDEEP
3072:mPNDIFbGKbGA+kXxYO7WhzszKRI3LA2hmtjObJgoRgcn2:kEFb/bGA+kXxn7WRiC6Awmtwgr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3bc1969468988005d283a4004d5063b_JaffaCakes118
Files
-
b3bc1969468988005d283a4004d5063b_JaffaCakes118.dll windows:4 windows x86 arch:x86
2e2fb441d203531fc8b88e572f4b31fc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateEventA
GetLastError
ResetEvent
SetEvent
FlushFileBuffers
WriteFile
SetFilePointer
CreateFileA
WaitForMultipleObjects
GetFileAttributesA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
ReadFile
GetFileSize
WaitForSingleObject
ReleaseMutex
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
lstrlenA
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
ResumeThread
GetModuleFileNameA
CreateNamedPipeA
CreateIoCompletionPort
TerminateThread
PostQueuedCompletionStatus
ExitThread
LeaveCriticalSection
EnterCriticalSection
OpenEventA
DisconnectNamedPipe
GetQueuedCompletionStatus
ConnectNamedPipe
TerminateProcess
DeleteFileA
WinExec
FreeLibrary
GetProcAddress
LoadLibraryA
MoveFileExA
MoveFileA
lstrcatA
GetTempFileNameA
GetShortPathNameA
GetVersion
SetFileAttributesA
SetEnvironmentVariableA
CompareStringW
CloseHandle
OpenMutexA
CreateThread
CreateMutexA
CompareStringA
LCMapStringW
LCMapStringA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
ExitProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
WideCharToMultiByte
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
user32
PostThreadMessageA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteExA
ole32
StgOpenStorage
StgCreateDocfile
wininet
InternetSetStatusCallback
HttpOpenRequestA
HttpAddRequestHeadersA
InternetReadFileExA
InternetOpenA
InternetConnectA
InternetSetOptionA
InternetAttemptConnect
InternetCloseHandle
InternetCrackUrlA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
rpcrt4
UuidCreate
UuidToStringA
netapi32
Netbios
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ