ProcessTrans
Static task
static1
Behavioral task
behavioral1
Sample
b7d0bb6e3d2b33abddcfe91d404cd116_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7d0bb6e3d2b33abddcfe91d404cd116_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b7d0bb6e3d2b33abddcfe91d404cd116_JaffaCakes118
-
Size
283KB
-
MD5
b7d0bb6e3d2b33abddcfe91d404cd116
-
SHA1
4d07d8c8d4c2b6670b93b4bd858fbc9f6230082a
-
SHA256
665d2ad5c57f7ed2816f8a164e82e59605f25dfbf11cfb7631907ed7b59d6372
-
SHA512
8a8a9752ba10868f630034f9a327af6d150a547f1ab81e49981c49204c4b101821a67cceb47fdc93fa2374b56387b466c4b2dad21e47f2176d7bb03b5206f73f
-
SSDEEP
6144:40qKTcVgG5NS/G2ScJJ77uInoPb3BVvb+sf0wDP8FW7M3G:he5NYG2D77XqBVviY+EM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7d0bb6e3d2b33abddcfe91d404cd116_JaffaCakes118
Files
-
b7d0bb6e3d2b33abddcfe91d404cd116_JaffaCakes118.dll windows:5 windows x86 arch:x86
af45db0b1923163bca08dfa777d98226
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wininet
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
InternetReadFile
HttpSendRequestA
InternetCloseHandle
InternetSetOptionA
HttpOpenRequestA
InternetConnectA
InternetOpenA
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
SHDeleteKeyA
ws2_32
setsockopt
send
recv
listen
bind
socket
htons
connect
inet_addr
accept
closesocket
kernel32
GetCurrentProcessId
GetModuleFileNameW
InterlockedDecrement
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
SetErrorMode
GetModuleHandleW
InterlockedIncrement
GlobalGetAtomNameA
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
lstrcmpW
GlobalFindAtomA
GetCPInfo
GlobalAddAtomA
RtlUnwind
ExitThread
CreateThread
GetTimeFormatA
GetDateFormatA
HeapFree
HeapAlloc
GetCommandLineA
RaiseException
VirtualAlloc
HeapReAlloc
ExitProcess
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
HeapCreate
HeapDestroy
VirtualFree
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
ResumeThread
GlobalDeleteAtom
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
GetModuleHandleA
FindNextFileA
GetModuleFileNameA
GetFullPathNameA
FindFirstFileA
FindClose
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetFileTime
GetFileSizeEx
GetFileAttributesA
CreateFileA
GetFileAttributesExA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
ReadFile
GetStdHandle
CreatePipe
SetStdHandle
DuplicateHandle
GetEnvironmentVariableA
CreateProcessA
WriteFile
CreateMutexA
ReleaseMutex
DeleteFileA
GetSystemDirectoryA
WaitForMultipleObjects
GetCurrentThread
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetVersion
GetVersionExA
WaitForSingleObject
SetEvent
Sleep
CreateEventA
SetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
GetCurrentProcess
GetTempPathA
Process32Next
GetVolumeInformationA
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
lstrcpyA
lstrlenA
TerminateProcess
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
CloseHandle
MoveFileA
CreateDirectoryA
GetOEMCP
user32
DestroyMenu
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
ClientToScreen
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowTextA
LoadCursorA
GetSysColor
GetSysColorBrush
UnregisterClassA
UnhookWindowsHookEx
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
CharUpperA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
SendMessageA
DispatchMessageA
PeekMessageA
TranslateMessage
ExitWindowsEx
keybd_event
mouse_event
SetCursorPos
GetDC
ReleaseDC
wsprintfA
DrawTextExA
gdi32
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ScaleWindowExtEx
SetWindowExtEx
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetStockObject
SelectPalette
RealizePalette
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
CreateDCA
GetDeviceCaps
DeleteDC
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
ImpersonateSelf
OpenThreadToken
GetUserNameA
RegEnumValueA
RegEnumKeyExA
EnumServicesStatusA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
QueryServiceConfigA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
DeleteService
ControlService
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ChangeServiceConfigA
shell32
ShellExecuteA
SHFileOperationA
oleaut32
VariantInit
VariantChangeType
VariantClear
avicap32
capCreateCaptureWindowA
Exports
Exports
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ