jvitpfjr
Static task
static1
Behavioral task
behavioral1
Sample
b6735a7d6f06650eefb1862503fb4c05_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b6735a7d6f06650eefb1862503fb4c05_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b6735a7d6f06650eefb1862503fb4c05_JaffaCakes118
-
Size
64KB
-
MD5
b6735a7d6f06650eefb1862503fb4c05
-
SHA1
1d67dbc6e8a4b69fff0065f07e91fd462c952784
-
SHA256
c27ea1c742c551007f0333946edf6f3d8768a1c29f125d536eef3c6d36a85627
-
SHA512
2ceeecae2d2a54e54f0066c87d6a8e04a6ab0b56c5358861c3456e67d7a73e122e7504beffe41e574bef9b8bcd0fa70b731953b63f7e8b773514efa7064532f0
-
SSDEEP
1536:grHoSDQZ5LaXDNd8Y+P6srf8UJF9xkOHG:grISDQZU3UP0Om
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6735a7d6f06650eefb1862503fb4c05_JaffaCakes118
Files
-
b6735a7d6f06650eefb1862503fb4c05_JaffaCakes118.dll windows:4 windows x86 arch:x86
28b608b28986391b1a5fcb5a69d0c666
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FileTimeToSystemTime
GetTimeZoneInformation
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
CompareStringW
CompareStringA
InterlockedExchange
HeapSize
RtlUnwind
InitializeCriticalSection
SetFilePointer
VirtualQuery
GetSystemInfo
VirtualProtect
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetCPInfo
UnhandledExceptionFilter
SetEnvironmentVariableW
SetEnvironmentVariableA
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
FileTimeToLocalFileTime
WriteFile
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
DeleteCriticalSection
HeapFree
HeapReAlloc
HeapAlloc
GetVersionExA
CreateThread
GetCurrentThreadId
ExitThread
GetFileAttributesA
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
FindClose
FindNextFileA
FindFirstFileA
GetExitCodeThread
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetLastError
FormatMessageA
LocalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameA
GetProcessHeap
ReadDirectoryChangesW
GetDriveTypeA
GetFullPathNameA
GetCurrentDirectoryA
ReadFile
Beep
advapi32
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
Exports
Exports
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ