Static task
static1
Behavioral task
behavioral1
Sample
cf0f85434c82185ebe7bdab746891200_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cf0f85434c82185ebe7bdab746891200_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cf0f85434c82185ebe7bdab746891200_JaffaCakes118
-
Size
96KB
-
MD5
cf0f85434c82185ebe7bdab746891200
-
SHA1
e0bb23149b2108601c466dc3b5087ad63139b858
-
SHA256
90ca2aced12c214143d0f29c2cfc222ea7753423ddef3f53dfd2ec7c66f07195
-
SHA512
ebe72fbec0052c492f5de085a5f457e9ec524478f40750c9239311302bfcc75e63648f90e0d490146d0605766a2cb8d9262b9c952ef590d938e1721338dc6aa6
-
SSDEEP
3072:g2mqai5GboOYlxc0BE5CS6O5oF69YXc/sqKNEo:9MTIc0BehUE//sUo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf0f85434c82185ebe7bdab746891200_JaffaCakes118
Files
-
cf0f85434c82185ebe7bdab746891200_JaffaCakes118.dll windows:4 windows x86 arch:x86
ecbb61056624d59b51679f08dfcaa9f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ShowOwnedPopups
RegisterClassA
MessageBeep
LoadIconA
IsCharUpperA
DestroyIcon
DefDlgProcA
CreateMenu
CreateIconFromResourceEx
CopyRect
BeginPaint
kernel32
LoadResource
lstrcmpiA
VirtualFree
TlsGetValue
TlsFree
TlsAlloc
OpenFileMappingA
LocalAlloc
LoadLibraryA
InitializeCriticalSection
GetSystemTimeAsFileTime
EnumResourceLanguagesA
EnumResourceNamesA
FindResourceA
FreeResource
GetCommandLineA
GetModuleHandleA
lstrcpynA
oleaut32
GetErrorInfo
OleIconToCursor
OleLoadPicture
OleLoadPicturePath
OleTranslateColor
RegisterTypeLib
SafeArrayAccessData
SafeArrayAllocData
SysStringLen
ClearCustData
Sections
.text Size: 26KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 66KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ