Static task
static1
Behavioral task
behavioral1
Sample
ce85500cad88257b43d84cda7cc264fa_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
ce85500cad88257b43d84cda7cc264fa_JaffaCakes118
-
Size
324KB
-
MD5
ce85500cad88257b43d84cda7cc264fa
-
SHA1
bbfb63b922408ff7a3390da07c94885145371b40
-
SHA256
31d883327033b6efb446e9416952c638152072095e6fbfab537b74bee477b6ca
-
SHA512
6db38f51eedaf5f0bc5f768edfbaa3e2833cb9ba3194c8ba269698891d5860a0bd41d391d2b9f94074b0e58814a595585903aad0b1c982669c23d4e62d3bafa6
-
SSDEEP
6144:bud7KJ4hF7popQTRq3va4jl6u31Ut+Ji370HnBs4NeuVCC:g7yUReva4jlNoQnBXek1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce85500cad88257b43d84cda7cc264fa_JaffaCakes118
Files
-
ce85500cad88257b43d84cda7cc264fa_JaffaCakes118.dll windows:5 windows x86 arch:x86
76ca4b0770cd5a3fae865eb520597417
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ole32
OleGetClipboard
setupapi
SetupDiClassNameFromGuidExW
user32
DestroyWindow
GetFocus
oleaut32
SafeArrayGetVartype
netapi32
NetGroupAdd
advapi32
RegCloseKey
kernel32
GetStdHandle
GetSystemTime
GetModuleHandleA
GetModuleHandleW
gdi32
ModifyWorldTransform
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt1 Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt2 Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ