Static task
static1
Behavioral task
behavioral1
Sample
c11d8c1e4c734e434e611e5f996c5137_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c11d8c1e4c734e434e611e5f996c5137_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c11d8c1e4c734e434e611e5f996c5137_JaffaCakes118
-
Size
916KB
-
MD5
c11d8c1e4c734e434e611e5f996c5137
-
SHA1
015dea81a0b537329ff8d6d28354e96bbd6c0c77
-
SHA256
48ffc410f5a1462abc44b4f9288d0b08a2d76d08cbbf4d048b71c107aa04f438
-
SHA512
58b28c9da2fd9fc4f24265daa1a0f52326bab0e30ee688af889bb34be581b068d6965bad17db44bcfa6651c9607178f7c168f46d73bf2c8a0dd75d223c035eb7
-
SSDEEP
12288:VTULZrgIgtIj0ZMaQVL3s6sQxC0G8YsbbmDvdnsOzorDplBjA/BNH:V41rgIgcxkV8Y1dn/zorDpPjA3H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c11d8c1e4c734e434e611e5f996c5137_JaffaCakes118
Files
-
c11d8c1e4c734e434e611e5f996c5137_JaffaCakes118.dll windows:4 windows x86 arch:x86
7ab631fc6fb3132a326636b598bd2a4e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
RaiseException
GetCommandLineA
GetProcessHeap
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetConsoleCtrlHandler
ExitProcess
VirtualAlloc
HeapSize
TerminateProcess
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetTimeFormatA
GetDateFormatA
SetHandleCount
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetConsoleCP
GetConsoleMode
SetStdHandle
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcess
FlushFileBuffers
GetThreadLocale
GlobalFindAtomW
InterlockedIncrement
GetModuleHandleA
CompareStringW
GlobalFlags
WritePrivateProfileStringW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
GetDriveTypeA
ReadConsoleInputA
TlsGetValue
LocalAlloc
InterlockedDecrement
GlobalFree
GlobalUnlock
GlobalAddAtomW
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameW
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
SetConsoleMode
GetFullPathNameA
GetCurrentDirectoryA
GlobalLock
lstrcmpW
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleW
FlushConsoleInputBuffer
GetVersionExA
LoadLibraryA
GlobalMemoryStatus
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
FindClose
FindFirstFileA
GetStdHandle
GetFileType
GetVersion
GetCurrentThreadId
WaitForSingleObject
FreeLibrary
SetFilePointer
SetEndOfFile
GetTimeZoneInformation
LoadLibraryW
GetProcAddress
WriteFile
CreateFileW
GetFileSize
CloseHandle
ReadFile
lstrcpynW
FormatMessageW
LocalFree
lstrlenA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
SetLastError
GetLastError
Sleep
lstrcpyW
FindResourceW
LoadResource
LockResource
SizeofResource
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
user32
ShowWindow
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
GetSysColorBrush
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
SetWindowLongW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetSysColor
ReleaseDC
GetDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
GetWindowTextW
SetWindowTextW
UnregisterClassW
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadCursorW
DestroyMenu
CreateWindowExW
GetClassInfoExW
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageW
PostQuitMessage
MessageBoxA
GetDesktopWindow
GetProcessWindowStation
GetUserObjectInformationW
SetWindowPos
UnregisterClassA
gdi32
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
DeleteDC
DeleteObject
SelectObject
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegisterEventSourceA
ReportEventA
DeregisterEventSource
CryptGetHashParam
CryptDestroyHash
CryptCreateHash
CryptHashData
CryptReleaseContext
CryptAcquireContextW
shlwapi
PathFindExtensionW
PathFindFileNameW
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
WSAStartup
WSACleanup
WSASetLastError
WSAGetLastError
gethostname
closesocket
bind
htonl
gethostbyname
inet_addr
htons
connect
recv
send
shutdown
socket
select
rpcrt4
RpcStringFreeW
UuidCreate
UuidToStringW
Sections
.text Size: 609KB - Virtual size: 609KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ