Static task
static1
Behavioral task
behavioral1
Sample
bc3de4c6e403553e9b2a702d202b05da_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc3de4c6e403553e9b2a702d202b05da_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bc3de4c6e403553e9b2a702d202b05da_JaffaCakes118
-
Size
248KB
-
MD5
bc3de4c6e403553e9b2a702d202b05da
-
SHA1
ab662b2e895aff7b6b175eda05f61837829d3cac
-
SHA256
e2f3c9da42bd9f7222e6de854caca18e01b8bc9ec177e806dc3dc5b162b1714a
-
SHA512
8607afb0a93288a2c7d2e349407ae8a0d6fd664233f93e09964ad57ff688c75565eaa5ec6d1a105b2677f73694f33bad9b69c59190d6b604f7d0f361f9cc5d3c
-
SSDEEP
6144:zUZJ/o04/zbM08zH+H7ktfTqZAqqDLujtvN:zUZRaNBH7STqZlqnujt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc3de4c6e403553e9b2a702d202b05da_JaffaCakes118
Files
-
bc3de4c6e403553e9b2a702d202b05da_JaffaCakes118.dll windows:4 windows x86 arch:x86
1c9de428a7eb3037c421011c01c78290
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
_llseek
_lread
GlobalFree
GetTempFileNameW
GetTempPathW
InterlockedIncrement
LocalAlloc
lstrcmpiW
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetProcessHeap
InterlockedCompareExchange
LoadLibraryExA
InterlockedExchange
Sleep
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
GetModuleHandleW
ReadFile
CreateMailslotW
SetConsoleMode
WriteConsoleW
ReadConsoleW
HeapValidate
CompareStringW
GetStdHandle
GetConsoleMode
FormatMessageW
GetConsoleOutputCP
WideCharToMultiByte
GetThreadLocale
GetComputerNameW
GetComputerNameExW
GetLocalTime
CreateEventW
WaitForSingleObjectEx
SetThreadPriority
CreateThread
GlobalAlloc
ResumeThread
GetThreadPriority
GetCurrentThread
SetPriorityClass
WaitForSingleObject
CreateProcessW
MapViewOfFile
lstrcpyW
lstrcatW
UnmapViewOfFile
ResetEvent
SetEvent
GetPriorityClass
CreateFileMappingW
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
HeapAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetModuleFileNameA
GetStartupInfoA
SetHandleCount
GetModuleHandleA
VirtualQuery
GetVersionExA
GetSystemInfo
RtlUnwind
CreateFileW
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
IsDBCSLeadByte
lstrlenW
InterlockedDecrement
ExpandEnvironmentStringsA
lstrcmpiA
GetFileAttributesA
MultiByteToWideChar
lstrlenA
GetCPInfo
GetACP
CloseHandle
CreateFileA
DeleteFileA
GetDriveTypeA
WriteFile
GetFileSize
GetShortPathNameA
GetFileType
CreateDirectoryA
LocalFree
LoadLibraryW
GetShortPathNameW
CopyFileA
SetFileAttributesA
MulDiv
CreateFileMappingA
ExitProcess
GetSystemDefaultLangID
GetFullPathNameA
GetPrivateProfileStringA
VirtualProtect
GetExitCodeProcess
GetCommandLineA
user32
GetMenuItemInfoW
InsertMenuW
GetMenuItemCount
DestroyMenu
RemoveMenu
SetMenuDefaultItem
ReleaseDC
GetDesktopWindow
GetActiveWindow
EnableMenuItem
GetMenu
PostMessageA
GetFocus
IsWindowUnicode
GetWindowTextLengthW
GetWindowTextW
EndDialog
MessageBoxW
ScreenToClient
MoveWindow
wsprintfW
DialogBoxParamA
DialogBoxParamW
IsWindow
GetDlgItem
GetClientRect
InvalidateRect
SetWindowPos
GetParent
SetFocus
GetWindowRect
EnableWindow
SendMessageA
GetWindowLongA
SetCursor
LoadCursorA
DestroyWindow
GetClassNameA
GetWindow
TrackPopupMenu
SendDlgItemMessageA
PeekMessageA
SetClassLongA
CharUpperW
SetWindowTextW
SendMessageW
RegisterClipboardFormatW
DeleteMenu
WinHelpA
CreatePopupMenu
CharNextA
SetWindowTextA
GetWindowTextLengthA
IsWindowEnabled
SetWindowLongA
EnumChildWindows
GetSystemMetrics
LoadBitmapA
DefWindowProcA
GetDC
CheckMenuItem
SetMenuItemInfoW
IsRectEmpty
InsertMenuItemW
LoadStringW
SetDlgItemTextW
CharToOemA
CharPrevA
SetForegroundWindow
UpdateWindow
LoadImageA
MessageBoxA
SetDlgItemTextA
CharLowerA
LoadStringA
GetWindowTextA
advapi32
ReportEventA
RegisterEventSourceA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
EqualSid
ChangeServiceConfigW
StartServiceW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
RegDeleteKeyW
RegCreateKeyExW
LookupAccountSidW
GetSidSubAuthorityCount
GetSidSubAuthority
RegOpenKeyExW
LsaOpenPolicy
LsaQueryInformationPolicy
LsaFreeMemory
SystemFunction016
SystemFunction006
ReportEventW
RegisterEventSourceW
DeregisterEventSource
gdi32
CreateFontIndirectW
GetObjectA
DeleteDC
GetTextExtentPoint32W
SelectObject
CreateICA
GetDeviceCaps
GetTextMetricsA
DeleteObject
CreateFontIndirectA
ole32
CoInitializeEx
CoGetClassObject
CoTaskMemFree
CoCreateInstance
rpcrt4
NdrClientCall2
I_RpcMapWin32Status
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcStringFreeW
RpcBindingFree
Sections
.text Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ