Static task
static1
Behavioral task
behavioral1
Sample
c0892255fb944aebf3494bc0899e7d37_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0892255fb944aebf3494bc0899e7d37_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c0892255fb944aebf3494bc0899e7d37_JaffaCakes118
-
Size
17.5MB
-
MD5
c0892255fb944aebf3494bc0899e7d37
-
SHA1
2bc78aebc1d56a7b7bacc44deebbd6fb99bf5d07
-
SHA256
b136f821491f1647b0a9d467b80958c3e746887387cb3d10a96ea93c1d9afccc
-
SHA512
3c6a260ed479fdd576f30f6cf97a78a0d4a54c5f3a4a2d6b8fc1bff20d4dac75adddff33ccaeba00a35b942f994ba4ada81f8cf61435f5092e07abd75b69ff96
-
SSDEEP
98304:2aAjhhJke3nVRgQ3516iSHhVCRfSPG3wBCYj+41Rh+7jIi:shgozSGKP4mTa5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0892255fb944aebf3494bc0899e7d37_JaffaCakes118
Files
-
c0892255fb944aebf3494bc0899e7d37_JaffaCakes118.dll windows:4 windows x86 arch:x86
33f214b8db303aa828b80d81c1109388
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
LeaveCriticalSection
EnterCriticalSection
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CloseHandle
OpenFileMappingA
IsBadWritePtr
lstrcmpiA
lstrcpyA
GetLastError
Sleep
CreateThread
WaitForSingleObject
SetEvent
LocalReAlloc
HeapFree
GetProcessHeap
lstrcpynW
GetModuleHandleA
OpenMutexA
CreateMutexA
CreateEventA
DeleteFileA
lstrcatA
GetExitCodeThread
HeapAlloc
lstrcmpA
GetProcAddress
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetCommandLineA
lstrcpynA
OpenThread
Thread32First
GetCurrentProcessId
CreateToolhelp32Snapshot
VirtualProtect
VirtualAlloc
LoadLibraryA
ExitProcess
InitializeCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
VirtualQuery
FreeLibraryAndExitThread
GetModuleFileNameA
VirtualFree
GetThreadContext
SetThreadContext
CreateFileA
GetFileSize
WideCharToMultiByte
ReadFile
SetFilePointer
LocalFree
lstrlenA
MultiByteToWideChar
Thread32Next
LocalAlloc
user32
DispatchMessageA
FindWindowA
PostMessageA
TranslateMessage
GetMessageA
LoadCursorA
LoadIconA
RegisterClassA
CreateWindowExA
SendMessageA
SetWindowLongA
DestroyWindow
PostQuitMessage
DefWindowProcA
SendMessageTimeoutA
gdi32
GetStockObject
shlwapi
StrStrIA
PathRemoveFileSpecA
StrStrW
StrStrA
dbghelp
ImageRvaToSection
msvcrt
atoi
_memicmp
_strnicmp
_adjust_fdiv
malloc
_initterm
free
atol
strtok
isalnum
isspace
fopen
fwrite
fclose
fflush
strncmp
strncpy
__CxxFrameHandler
sprintf
_itoa
_errno
??2@YAPAXI@Z
??3@YAXPAX@Z
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ