MyWorkMain
Static task
static1
Behavioral task
behavioral1
Sample
bd85048631676644ac1681183a40c8b9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd85048631676644ac1681183a40c8b9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bd85048631676644ac1681183a40c8b9_JaffaCakes118
-
Size
115KB
-
MD5
bd85048631676644ac1681183a40c8b9
-
SHA1
f8bdf2efd6c7a3d7c7d35bf570184a286dc2f16e
-
SHA256
e95909372c6749d049454d0c7885f607d0f001a45119e740800b70d286e89fe9
-
SHA512
36920ccb9db4cabef07a4d185b73da87c68c005cf32520d819a5699e0c362126efefe3229b8345a5bc96ad6ab10de38621c2eea727c176247572053c41b067a4
-
SSDEEP
1536:/DStPLy+pciYhfVXSBDZmxLTsz4WvHdu3rvws0K:7sy+ptYRVXSPmju9u3rws0K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd85048631676644ac1681183a40c8b9_JaffaCakes118
Files
-
bd85048631676644ac1681183a40c8b9_JaffaCakes118.dll windows:4 windows x86 arch:x86
273843f4cd3574cb489b52a8d9329881
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetVersionExA
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
WriteFile
ReadFile
PeekNamedPipe
TerminateProcess
TerminateThread
WaitForMultipleObjects
SetFilePointer
CreateFileA
GetModuleFileNameA
lstrlenA
DeleteFileA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
GetComputerNameA
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
MoveFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrcatA
LCMapStringW
LCMapStringA
LoadLibraryA
GetOEMCP
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetACP
CreateMutexA
GetTickCount
CreateThread
ResumeThread
SetEvent
Sleep
CreateEventA
WaitForSingleObject
CloseHandle
ReleaseMutex
GetCurrentProcess
GetModuleHandleA
LocalReAlloc
GetProcAddress
IsBadCodePtr
IsBadReadPtr
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
RtlUnwind
HeapReAlloc
HeapAlloc
RaiseException
HeapFree
GetCommandLineA
GetVersion
ExitProcess
HeapSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
VirtualFree
VirtualAlloc
IsBadWritePtr
GetEnvironmentVariableA
HeapDestroy
HeapCreate
SetUnhandledExceptionFilter
SetHandleCount
user32
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
wsprintfA
CharNextA
DispatchMessageA
advapi32
RegQueryValueA
RegCloseKey
RegisterServiceCtrlHandlerA
SetServiceStatus
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
RegOpenKeyExA
shell32
SHGetFileInfoA
ws2_32
WSAGetLastError
send
WSAAsyncSelect
connect
htons
inet_addr
socket
WSAStartup
WSACleanup
recv
closesocket
getsockname
Exports
Exports
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ