Static task
static1
Behavioral task
behavioral1
Sample
bd0bda646c1f4c43edd18a82860fc933_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd0bda646c1f4c43edd18a82860fc933_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bd0bda646c1f4c43edd18a82860fc933_JaffaCakes118
-
Size
116KB
-
MD5
bd0bda646c1f4c43edd18a82860fc933
-
SHA1
268c9163fd25d9ec8a09c6cd0d99176c5a718bb7
-
SHA256
5a216bdceeea8f58a8da9f578c6d612831b283cc4e528b6295936dbdec4f3d12
-
SHA512
47b48385cf3037c8afe217469631c632fc9494cba262c763463ec7fe06f1a5aa3e63f6cf36d46ceb6451cd518b304014b531ac85f8f8fd25ff9c550a9639ba67
-
SSDEEP
1536:jxIAYeD9CNGwxsPiUoJl6TItp8+S+4ifgZklB/tf9S8zDW9rFkL7z1Epomwf+ne:ePGCwPirzp8+SafcEtl9W9rFQ7apU+e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd0bda646c1f4c43edd18a82860fc933_JaffaCakes118
Files
-
bd0bda646c1f4c43edd18a82860fc933_JaffaCakes118.dll windows:5 windows x86 arch:x86
0f51375b5a32824467550210f86d41b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
GetUserNameW
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
user32
SetWindowLongA
SetTimer
SetMenuItemInfoW
SetMenu
SetDebugErrorLevel
RemoveMenu
RegisterClassA
PostMessageA
OpenClipboard
NotifyWinEvent
MessageBoxW
MapVirtualKeyA
MapDialogRect
LookupIconIdFromDirectory
LockSetForegroundWindow
LoadIconA
LoadCursorA
LoadAcceleratorsW
LoadAcceleratorsA
KillTimer
IsZoomed
IsWindowEnabled
IsDlgButtonChecked
InvalidateRect
InsertMenuItemA
GetWindowTextA
GetWindowPlacement
GetUserObjectInformationA
GetTitleBarInfo
GetSubMenu
GetMenuItemInfoW
SetWindowTextW
GetMenuItemCount
GetGUIThreadInfo
GetDlgItem
GetClientRect
GetClassInfoW
GetClassInfoA
GetCapture
FlashWindowEx
FindWindowA
EndPaint
EnableWindow
EmptyClipboard
DrawStateW
DrawMenuBar
DispatchMessageW
DestroyWindow
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
DdeGetLastError
DdeConnectList
CreateWindowExW
CreateWindowExA
CreateMenu
CreateIconIndirect
CreateAcceleratorTableA
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
CharUpperW
CharLowerW
wsprintfA
UpdateLayeredWindow
TranslateMessage
TranslateMDISysAccel
TranslateAcceleratorW
TranslateAcceleratorA
TileWindows
ShowWindow
GetMenuItemInfoA
ShowScrollBar
kernel32
lstrcatA
WideCharToMultiByte
WaitForSingleObject
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
SystemTimeToFileTime
SetPriorityClass
SetLastError
SetFilePointer
SetEvent
SetEndOfFile
RemoveDirectoryA
ReadFile
MultiByteToWideChar
LocalFree
LoadLibraryA
InterlockedIncrement
HeapAlloc
GlobalUnlock
GlobalSize
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVolumeInformationW
GetVolumeInformationA
GetVersionExA
GetUserDefaultLangID
GetTickCount
GetTempPathW
GetSystemTime
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLogicalDriveStringsA
GetLastError
GetFullPathNameA
GetFileSize
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentProcess
FormatMessageA
FindNextFileA
FindNextChangeNotification
FindFirstFileA
FindFirstChangeNotificationA
FindCloseChangeNotification
FindClose
FileTimeToSystemTime
FileTimeToDosDateTime
ExitProcess
DeviceIoControl
DeleteFileA
DeleteCriticalSection
CreateFileA
CreateDirectoryA
CopyFileW
CopyFileA
CompareFileTime
ole32
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
DoDragDrop
OleInitialize
OleUninitialize
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
shell32
SHBrowseForFolderA
SHFileOperationA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SheChangeDirA
ShellExecuteA
SHChangeNotify
msvcrt
wcsncmp
wcslen
strlen
srand
rand
memset
memmove
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_adjust_fdiv
_beginthreadex
_controlfp
_except_handler3
_exit
_initterm
_onexit
_purecall
_wcsicmp
exit
free
malloc
memcmp
memcpy
comdlg32
PrintDlgA
GetFileTitleA
Sections
.text Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ