Static task
static1
Behavioral task
behavioral1
Sample
ce8ac4605001ff324ab4dbd97dd0f71c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ce8ac4605001ff324ab4dbd97dd0f71c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ce8ac4605001ff324ab4dbd97dd0f71c_JaffaCakes118
-
Size
116KB
-
MD5
ce8ac4605001ff324ab4dbd97dd0f71c
-
SHA1
e82edf1ccfb8d788dd377fd82dd6c1f6df250321
-
SHA256
7a3f7b72b1b6efbda9bfe3011dde414fd82d32857e20693e895b141909b2bd77
-
SHA512
9d4468ded7ce2a0a59d841484dd432b453c5723443d97bf3885eebc63c2259c36bb96c3f028ad42f990dd1030309892c0d9a81d760b914d390733bb11b9dc395
-
SSDEEP
1536:aPVMH7XYEme6D0O6+1s7HwmceV4s8OCZhYBYAz7vl+HDJBYkty8:DI91lmc1s8RZe+Az7t+Htmu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce8ac4605001ff324ab4dbd97dd0f71c_JaffaCakes118
Files
-
ce8ac4605001ff324ab4dbd97dd0f71c_JaffaCakes118.dll windows:4 windows x86 arch:x86
b75cf7898efed9bb39186561dd28d51a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAllocEx
ExitProcess
WritePrivateProfileSectionA
GetDateFormatA
lstrcatA
WriteFileEx
HeapCreate
VirtualAlloc
EnumUILanguagesA
GetCurrentThreadId
GetCommandLineA
SetVolumeMountPointA
SetConsoleTitleA
user32
LoadBitmapW
CreateIcon
GetWindowTextA
SetDoubleClickTime
CreateWindowExA
CloseClipboard
GetLayeredWindowAttributes
DestroyWindow
RegisterUserApiHook
GetUserObjectSecurity
GetMenuDefaultItem
gdi32
AddFontResourceA
Sections
.text Size: 104KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ