Static task
static1
Behavioral task
behavioral1
Sample
c8468ee49809110a1e6d916ad33d5942_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8468ee49809110a1e6d916ad33d5942_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c8468ee49809110a1e6d916ad33d5942_JaffaCakes118
-
Size
42KB
-
MD5
c8468ee49809110a1e6d916ad33d5942
-
SHA1
0ececc63a6bfe6e0f06fe46604e234ef05197418
-
SHA256
ae4c86f1ceb2228f2f11175a9901918ee7a2ba28cf56787b9724e4377bf95d88
-
SHA512
942284cf3ba1240b2974944b0890a11422a399573ee22165ddcbe5500b8faccf79fff54dca106d4fb01b61de87a1241095327da7ebd1ff53fb0a8239fdd220fc
-
SSDEEP
768:Bf0vo6E31MH7jJaWOVc47iL8iyzvquCvWO3N3RyAy1o90sa:h6o64WHBaWOVc47idSvqDvl3N3A7oas
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c8468ee49809110a1e6d916ad33d5942_JaffaCakes118
Files
-
c8468ee49809110a1e6d916ad33d5942_JaffaCakes118.dll windows:4 windows x86 arch:x86
f8b8e14e290c485ffcbcef25ccb75f55
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetProcAddress
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
VirtualFree
HeapFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ