Vout
Static task
static1
Behavioral task
behavioral1
Sample
b6c6ebcbb44dd9a6db13f47bce70d0cc_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b6c6ebcbb44dd9a6db13f47bce70d0cc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b6c6ebcbb44dd9a6db13f47bce70d0cc_JaffaCakes118
-
Size
163KB
-
MD5
b6c6ebcbb44dd9a6db13f47bce70d0cc
-
SHA1
669b8621652c1ca462f4d2edbf16da1373b35525
-
SHA256
56575af11b3b6b901bbf432a93d5ef8c42ad3aa3643779fac99f6672aa87be65
-
SHA512
4e14a1587786d80e22ea34f1b94ed6ed23aaaf53eab6c98c71e2a0406d302b65f00dc19f1524b971ba4e0b709650f688f008dea8946201e1d8a6fc3e7cfbbee2
-
SSDEEP
3072:X1WFmm9ZuiU/13XS/56xDe3NmLbccyUC2KQvxoP:X1WV9siOX6A0cbzZvG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6c6ebcbb44dd9a6db13f47bce70d0cc_JaffaCakes118
Files
-
b6c6ebcbb44dd9a6db13f47bce70d0cc_JaffaCakes118.dll windows:4 windows x86 arch:x86
5384161eb1672ebe3c4b893511997838
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GlobalUnlock
OutputDebugStringA
GetLocalTime
LoadLibraryA
GetCurrentThreadId
WritePrivateProfileStringA
GetSystemDirectoryA
TerminateThread
SetFilePointer
WriteProcessMemory
VirtualAllocEx
DeleteFileA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
MultiByteToWideChar
GetFullPathNameA
CopyFileA
GetFileSize
FlushFileBuffers
WriteFile
GetVersionExA
LockResource
LoadResource
CreateFileA
FindResourceA
VirtualProtectEx
SetThreadPriority
DisableThreadLibraryCalls
GetCommandLineA
VirtualAlloc
VirtualFree
WideCharToMultiByte
ReadFile
ExitProcess
GetPrivateProfileIntA
GetPrivateProfileStringA
GetComputerNameA
GetCurrentProcess
CreateThread
Sleep
GlobalSize
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CancelIo
InterlockedExchange
SetEvent
ResetEvent
lstrcpyA
lstrlenA
LocalAlloc
SetErrorMode
GetModuleFileNameA
lstrcmpiA
lstrcatA
GetTickCount
RtlUnwind
OpenEventA
CreateEventA
CloseHandle
IsBadReadPtr
GlobalAlloc
GlobalLock
GetModuleHandleA
ReadProcessMemory
GetProcAddress
GlobalFree
SizeofResource
GetStringTypeW
GetStringTypeA
user32
wsprintfA
GetWindowTextA
FindWindowA
EnumChildWindows
SendMessageA
GetForegroundWindow
ClientToScreen
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetInputState
PostThreadMessageA
GetMessageA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetClassNameA
ExitWindowsEx
BlockInput
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
SetRect
GetSystemMetrics
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetClientRect
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
ws2_32
send
setsockopt
connect
select
gethostbyname
socket
WSACleanup
closesocket
recv
ntohs
htons
WSAStartup
advapi32
RegCreateKeyA
RegDeleteKeyA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
msvcrt
??2@YAPAXI@Z
??3@YAXPAX@Z
_CxxThrowException
_ftol
memmove
ceil
_beginthreadex
calloc
free
??1type_info@@UAE@XZ
realloc
__CxxFrameHandler
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetPaletteEntries
CreateHalftonePalette
Exports
Exports
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ