Static task
static1
Behavioral task
behavioral1
Sample
d0d337f752cd02f58dd474df5b6355e8_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0d337f752cd02f58dd474df5b6355e8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d0d337f752cd02f58dd474df5b6355e8_JaffaCakes118
-
Size
24KB
-
MD5
d0d337f752cd02f58dd474df5b6355e8
-
SHA1
aff075b89290d0d5989685657e8a37e5b43372c1
-
SHA256
8ecec2d113e6f2fbe1a4cd0257d5151ccf5caccf41c944da0e3fe72673cdb073
-
SHA512
952680b7381cfcb19d63a17685dc0ed8c048fbc4e9bad0e05f911eb521a6315ced0ff1b44978a6bd8c5966c64c992f6d7e7204625d17ebd10456ffc0dcce60dd
-
SSDEEP
384:+XIJ5lb+uVaZ6IIqVxdNlxSK+tmZe83D6C3MFTLSoiz2MVLzVKwZfcT:1J5lb+ukZV7drxd+tmZTDj8TGvUwZf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0d337f752cd02f58dd474df5b6355e8_JaffaCakes118
Files
-
d0d337f752cd02f58dd474df5b6355e8_JaffaCakes118.dll windows:4 windows x86 arch:x86
fcf52abfd6d23099b0464bc5d66c024e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
SetFilePointer
CreateFileA
IsBadReadPtr
DeleteFileA
ReadFile
GetFileSize
InitializeCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
WriteFile
OpenThread
SetUnhandledExceptionFilter
ReadProcessMemory
GetCurrentThread
WriteProcessMemory
CloseHandle
GetModuleHandleA
GetCurrentProcess
GetCurrentThreadId
VirtualProtectEx
GetModuleFileNameA
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
GetLastError
GetComputerNameA
SetThreadContext
Sleep
user32
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowThreadProcessId
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
_strlwr
free
_initterm
malloc
_adjust_fdiv
_stricmp
sscanf
??3@YAXPAX@Z
fopen
fread
memcpy
sprintf
??2@YAPAXI@Z
strlen
strcat
strcpy
strrchr
memset
strstr
strchr
memcmp
strncpy
strcmp
wcslen
fclose
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ