Static task
static1
Behavioral task
behavioral1
Sample
c0eca6dceeba31a3f87409bdabf340c9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0eca6dceeba31a3f87409bdabf340c9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c0eca6dceeba31a3f87409bdabf340c9_JaffaCakes118
-
Size
13KB
-
MD5
c0eca6dceeba31a3f87409bdabf340c9
-
SHA1
c38bb1d27105d78e20e5c87e35885a38a3e0164d
-
SHA256
8cd6787be14895e0edd6746d3d3b12f9435a0eeb140fb043282c6c9f0fc2ea19
-
SHA512
7b830a128fcc6db22292128e85bc955e1882bad1198d34765483bbd8b1e9ef99002ccb3fe31776e0d43c8528b8a64eddd6837900436b3ee361f886f51fb9a4c8
-
SSDEEP
192:k8xYDRqp3xQN6rE4yalDt1ECjXvLGkw+lQqDjZ3btsNqnMYPYvjAm5Dar:kCY1qBuN6oClx1EoiqZtsNqMYPc9a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0eca6dceeba31a3f87409bdabf340c9_JaffaCakes118
Files
-
c0eca6dceeba31a3f87409bdabf340c9_JaffaCakes118.dll windows:4 windows x86 arch:x86
bbea75cc7255177a48363d320c9035ac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateProcess
OpenProcess
GetCurrentProcessId
WritePrivateProfileStringA
CloseHandle
LoadLibraryA
GetModuleFileNameA
GetFileSize
ReadFile
SetFilePointer
CreateFileA
GetProcAddress
HeapAlloc
GetProcessHeap
GetCurrentProcess
GetModuleHandleA
GetWindowsDirectoryA
GetPrivateProfileStringA
Sleep
user32
wsprintfA
wininet
InternetCloseHandle
msvcrt
_strcmpi
strcat
memset
sprintf
strlen
strcpy
_stricmp
strchr
free
malloc
strncpy
memcpy
_except_handler3
strrchr
_local_unwind2
strcmp
_vsnprintf
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ