Static task
static1
Behavioral task
behavioral1
Sample
b9cba9fdb76826916fdb8af17c587c65_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9cba9fdb76826916fdb8af17c587c65_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b9cba9fdb76826916fdb8af17c587c65_JaffaCakes118
-
Size
72KB
-
MD5
b9cba9fdb76826916fdb8af17c587c65
-
SHA1
a4fc9d8d7f727848fb7786ae3ee81f7ce47bd8e6
-
SHA256
711806db737eae911cffec7223fa1316920646ca2f48149ffaa2ef90f280fa17
-
SHA512
8cd534b1488d57ea5298182d1db1ce7c60b3ee78a5646e39d50270eedb2566c6b0dc8f641c7521127717206562aab9f5112bbb749c154c1505545991cb4ddb74
-
SSDEEP
1536:XO+4zz8hDZSOclFFIUYT/BjLYesugSldrza:eWDXh/VqugSldr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9cba9fdb76826916fdb8af17c587c65_JaffaCakes118
Files
-
b9cba9fdb76826916fdb8af17c587c65_JaffaCakes118.dll windows:4 windows x86 arch:x86
8f68f3ec033a8f8d4811d419622aa325
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTimeFormatA
GetTimeZoneInformation
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LocalAlloc
LocalFree
OpenProcess
VirtualAllocEx
VirtualFreeEx
WideCharToMultiByte
WriteFile
WriteProcessMemory
lstrcatA
lstrcpyA
lstrlenA
Sleep
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
CreateThread
InitializeCriticalSection
GetWindowsDirectoryA
Process32Next
TerminateProcess
Process32First
CreateToolhelp32Snapshot
ExitThread
GetProcAddress
LoadLibraryA
GetTickCount
HeapSize
LCMapStringW
GetLocalTime
GetDateFormatA
CreateRemoteThread
CreateFileA
DeleteFileA
CloseHandle
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCPInfo
GetOEMCP
GetACP
FlushFileBuffers
SetStdHandle
InterlockedExchange
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualProtect
MultiByteToWideChar
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapFree
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetLastError
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
GetCurrentProcess
GetModuleFileNameA
user32
wsprintfA
FindWindowA
GetWindowThreadProcessId
CharUpperA
advapi32
RegOpenKeyA
RegEnumKeyExA
RegCloseKey
IsTextUnicode
RegQueryValueExA
ole32
CreateStreamOnHGlobal
GetHGlobalFromStream
shlwapi
StrStrA
PathFileExistsA
StrStrIA
wsock32
socket
htons
connect
closesocket
recv
send
ioctlsocket
inet_addr
htonl
gethostbyaddr
getsockname
WSAStartup
gethostbyname
wininet
FindNextUrlCacheEntryA
InternetGetConnectedState
FindFirstUrlCacheEntryA
FindCloseUrlCache
DeleteUrlCacheEntryA
urlmon
URLDownloadToFileA
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ