Static task
static1
Behavioral task
behavioral1
Sample
b9c7fac5989f7491428c151393d334a1_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b9c7fac5989f7491428c151393d334a1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b9c7fac5989f7491428c151393d334a1_JaffaCakes118
-
Size
56KB
-
MD5
b9c7fac5989f7491428c151393d334a1
-
SHA1
2c92a051748b03033f76eadb5a69d75fc420453a
-
SHA256
c878442f59f71e946b7eb94437a0dda3ced739527b5b08187f18392e374df17f
-
SHA512
d84f70132c0730209cb550f83f15b52d741cc48013d785d75bd7c2aaaff9991d210908b7f0868306b0c3698d1992cb776ee8136b17ee725fb58077f70b0198a2
-
SSDEEP
768:o6H3XTYIstsIxUNNtYr8YDTQi6r5GLYCz9CRenchlirazmwhC:NH3XMIstXxUuDTQi6NGFB5Mliu6J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9c7fac5989f7491428c151393d334a1_JaffaCakes118
Files
-
b9c7fac5989f7491428c151393d334a1_JaffaCakes118.dll windows:4 windows x86 arch:x86
077a31001b35eb043b039c9b407c8a86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
SetFilePointer
CreateFileA
GetLastError
GetCurrentProcess
GetFileSize
VirtualQuery
ReadFile
WinExec
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
GetVersionExA
ExitProcess
CreateMutexA
CreateThread
GetModuleFileNameA
OpenProcess
GetSystemDirectoryA
DeleteCriticalSection
SetHandleCount
TerminateProcess
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
InitializeCriticalSection
CloseHandle
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapCreate
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
IsBadWritePtr
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
GetCPInfo
user32
SetForegroundWindow
ShowWindow
FindWindowA
EnableWindow
GetDlgItem
DialogBoxParamA
MessageBoxA
SendMessageA
SetDlgItemTextA
IsWindow
GetWindowTextA
PostMessageA
SetFocus
SetWindowTextA
EndDialog
GetWindowRect
WindowFromPoint
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegEnumKeyExA
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ