Static task
static1
Behavioral task
behavioral1
Sample
bff9e10960803ce00a89aacc8957829f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bff9e10960803ce00a89aacc8957829f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bff9e10960803ce00a89aacc8957829f_JaffaCakes118
-
Size
272KB
-
MD5
bff9e10960803ce00a89aacc8957829f
-
SHA1
4badf0bc87b9bd89d0a478d53847351673428fda
-
SHA256
e065985db9694c40252973d91693849e59866c896dccfde7db342374ad7c9d13
-
SHA512
e100bfae94ec45a4220f8492365785a4dc64e6dbda21709175b8ae0d773d4e4240dad34aa870f7edbddd35b0e94926fb25e0cd3d3ae71ff65fdba351dd0cf5b9
-
SSDEEP
6144:8kPWNC34mKB2c8UeV5UNvjd697CYBgjJW3srUuib:8kPH3hK18U1vjd6MYBgM3Lb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bff9e10960803ce00a89aacc8957829f_JaffaCakes118
Files
-
bff9e10960803ce00a89aacc8957829f_JaffaCakes118.dll windows:6 windows x86 arch:x86
d32931e398cdb95e012480d245012e9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
RaiseException
GetLastError
HeapAlloc
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
CreateRemoteThread
VirtualAllocEx
WriteProcessMemory
GetCurrentProcess
VirtualAlloc
DecodePointer
ReadProcessMemory
GetModuleHandleA
GetModuleHandleW
GetProcAddress
HeapFree
Sleep
SuspendThread
ResumeThread
VirtualProtect
WriteConsoleW
ReadFile
GetFileSize
VirtualFree
CreateFileW
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
InterlockedFlushSList
SetLastError
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
GetStdHandle
GetFileType
GetACP
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
HeapReAlloc
GetStringTypeW
FlushFileBuffers
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
Sections
.text Size: 235KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ