Static task
static1
Behavioral task
behavioral1
Sample
c0245886fde68f3ff466718ec9b8364f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0245886fde68f3ff466718ec9b8364f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c0245886fde68f3ff466718ec9b8364f_JaffaCakes118
-
Size
40KB
-
MD5
c0245886fde68f3ff466718ec9b8364f
-
SHA1
e6a46d54c9835e22351528e2b07663d5ad0d1ac0
-
SHA256
51b1f539169ffd7b4ff56b52597462b770f6ceb2ea28991cc69aeb1844dec7c9
-
SHA512
c6989518c13fde40f6c33d05aee19c4b8af1851bd90056e3a2953da63c46667b1199a9dab590e176fbbf313fd267eb097fb4093aefce773f29bf147d97667f55
-
SSDEEP
384:9tGG6tFoglIZX34p4RotZczgFLBmrGkogrME8vDa+VetK34JCO1aJCO+M72kLD94:vB6teO/8pqkDgtVekIJJ1aJJ+O2kL+xV
Malware Config
Signatures
Files
-
c0245886fde68f3ff466718ec9b8364f_JaffaCakes118.dll windows:4 windows x86 arch:x86
c7b21d815cf086bc6a450d08af37c793
Code Sign
73:c5:c1:37:ed:ea:1d:46:b1:39:97:29:6a:94:56:0cCertificate
IssuerCN=Root AgencyNot Before08/12/2009, 07:43Not After31/12/2039, 23:59SubjectCN=Windows CorporationSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
InitializeCriticalSection
FlushInstructionCache
GetCurrentProcess
GetTickCount
InterlockedDecrement
lstrlenA
Sleep
GetProcAddress
LoadLibraryA
DeleteCriticalSection
GetModuleFileNameA
DebugBreak
OutputDebugStringA
lstrcpynW
lstrcpynA
OpenProcess
CloseHandle
HeapDestroy
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
GetVersionExA
InterlockedIncrement
user32
GetClientRect
MessageBeep
DestroyMenu
GetMenuItemInfoA
AppendMenuA
GetMenuItemCount
CreatePopupMenu
TrackPopupMenuEx
GetMonitorInfoA
MonitorFromPoint
IsWindow
MapWindowPoints
PtInRect
RemoveMenu
CallWindowProcA
GetWindowLongA
GetTopWindow
GetClassNameA
GetParent
GetWindow
InvalidateRect
TranslateMessage
GetMessageA
SetWindowPos
CharNextA
SendMessageA
GetWindowTextA
GetCursorPos
GetWindowRect
SetCursorPos
mouse_event
KillTimer
PostMessageA
GetLastInputInfo
SetTimer
DefWindowProcA
TranslateAcceleratorA
GetClassInfoExA
LoadCursorA
wsprintfA
LoadImageA
RegisterClassExA
SetWindowLongA
CreateWindowExA
LoadStringA
LoadMenuA
wvsprintfA
PostQuitMessage
LoadStringW
DispatchMessageA
LoadAcceleratorsA
DestroyWindow
FindWindowA
ShowWindow
PeekMessageA
SetFocus
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
ole32
OleUninitialize
OleInitialize
msvcrt
atoi
isdigit
wcslen
strrchr
strstr
_initterm
time
_purecall
??2@YAPAXI@Z
memmove
realloc
??3@YAXPAX@Z
free
_except_handler3
malloc
_adjust_fdiv
__CxxFrameHandler
_strcmpi
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Xlen@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
Exports
Exports
Aetxml
BetDml
DllRundll
setxml
sssweew
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ