fsvizuwfdosjn.r2e
Static task
static1
Behavioral task
behavioral1
Sample
b4b13d4008d0951e086fa5bf6052e5cd_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b4b13d4008d0951e086fa5bf6052e5cd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b4b13d4008d0951e086fa5bf6052e5cd_JaffaCakes118
-
Size
140KB
-
MD5
b4b13d4008d0951e086fa5bf6052e5cd
-
SHA1
9e31c353be09325547a8e0b583b3b116455a0a1c
-
SHA256
30b2c2132aacb395fbf2a94b1d3af62e69c7662564e3a82ce800e5d3f11b1f7f
-
SHA512
671c31d816070f1e6e0bebe642355537bdf833e1a2c5276094da98e9da4db3ece662139263e3a19eb5ba2741fec701f495a26ff7f87d56ba20171b17312e8934
-
SSDEEP
3072:5Cw8Inm96lfy37aTHsHDvoG55TjbGapLHEPjJ/sh7:kKm2Ca4HzZjbGapqJEt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4b13d4008d0951e086fa5bf6052e5cd_JaffaCakes118
Files
-
b4b13d4008d0951e086fa5bf6052e5cd_JaffaCakes118.dll windows:4 windows x86 arch:x86
79fc9ca2324d334e8839401d05ffb970
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
ResetEvent
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSection
lstrcpyW
lstrcatW
SetLastError
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetLastError
FreeEnvironmentStringsA
GetProcAddress
LoadLibraryExW
Sleep
InterlockedCompareExchange
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
IsBadCodePtr
IsBadReadPtr
VirtualQuery
IsBadWritePtr
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
HeapSize
HeapReAlloc
HeapAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
InterlockedExchangeAdd
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
InterlockedDecrement
GetModuleFileNameA
GetStdHandle
WriteFile
GetModuleHandleA
RaiseException
RtlUnwind
GetVersionExA
GetCommandLineA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateNamedPipeA
ConnectNamedPipe
ReadFile
DisconnectNamedPipe
CreateTimerQueueTimer
CreateEventA
CreateThread
WaitForMultipleObjects
InterlockedExchange
DeleteTimerQueueTimer
ExitProcess
GetCurrentProcessId
InterlockedIncrement
GetCurrentProcess
DuplicateHandle
CloseHandle
OpenProcess
SetEvent
MoveFileA
CreateMutexW
GetStartupInfoA
ReleaseMutex
user32
wsprintfW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Exports
Exports
noqpr
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ