Static task
static1
Behavioral task
behavioral1
Sample
d0da2de8d95e2ca9cba0bf7e2acd3ab1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0da2de8d95e2ca9cba0bf7e2acd3ab1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d0da2de8d95e2ca9cba0bf7e2acd3ab1_JaffaCakes118
-
Size
218KB
-
MD5
d0da2de8d95e2ca9cba0bf7e2acd3ab1
-
SHA1
a18006dff0785dc6b7b0199b83243ae89dd38495
-
SHA256
d15c7872b8d4772bb4bd58fa5735ab9488f736c9ec366762d23757fd449ba083
-
SHA512
b9f6861e1227a526c68f5622c5db2149cc65e8e82150c3e28a141a976e7fac9ae5d74abc1633c005be969bc261de81fea6e6115105d7859c2584cf792f0779fc
-
SSDEEP
6144:mc0WN/icLj2BGxVnKnGpFffOybOYZmC7z33:mc0Wsmj2BFGFffOybOYx7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0da2de8d95e2ca9cba0bf7e2acd3ab1_JaffaCakes118
Files
-
d0da2de8d95e2ca9cba0bf7e2acd3ab1_JaffaCakes118.dll windows:4 windows x86 arch:x86
40f54d3efaa5d38539bae531d45f47de
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCommandLineA
GlobalUnlock
OutputDebugStringA
GetLocalTime
GetProcAddress
LoadLibraryA
GetCurrentThreadId
WritePrivateProfileStringA
GetSystemDirectoryA
TerminateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
DeleteFileA
WriteFile
GetFileSize
VirtualProtectEx
SetThreadPriority
GetLastError
CreateMutexA
VirtualAlloc
VirtualFree
CreateEventA
MultiByteToWideChar
CreateFileA
Process32First
CreateToolhelp32Snapshot
Thread32Next
Thread32First
GetThreadPriority
GetWindowsDirectoryA
CloseHandle
IsBadReadPtr
ReadFile
ExitProcess
GetPrivateProfileIntA
GetPrivateProfileStringA
GetComputerNameA
GetCurrentProcess
CreateThread
Sleep
GlobalSize
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CancelIo
InterlockedExchange
SetEvent
ResetEvent
lstrcpyA
lstrlenA
LocalAlloc
SetErrorMode
lstrcatA
lstrcmpiA
GetTickCount
WaitForSingleObject
RtlUnwind
GetModuleFileNameA
GetStringTypeW
GetStringTypeA
GlobalAlloc
GlobalLock
Process32Next
OpenEventA
GetModuleHandleA
ReadProcessMemory
GlobalFree
WideCharToMultiByte
user32
keybd_event
GetClassNameA
GetClientRect
ClientToScreen
ToUnicode
GetAsyncKeyState
GetKeyState
GetKeyboardState
MapVirtualKeyA
ToAscii
GetDC
ReleaseDC
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetInputState
PostThreadMessageA
GetMessageA
GetWindowThreadProcessId
IsWindowVisible
ExitWindowsEx
BlockInput
GetForegroundWindow
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
SetRect
GetSystemMetrics
GetDesktopWindow
GetCursorPos
wsprintfA
GetWindowTextA
FindWindowA
EnumChildWindows
SendMessageA
IsWindowEnabled
wininet
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetCloseHandle
gdi32
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetPaletteEntries
CreateHalftonePalette
GetPixel
advapi32
OpenProcessToken
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCreateKeyExA
msvcrt
_ftol
??1type_info@@UAE@XZ
__CxxFrameHandler
realloc
??2@YAPAXI@Z
strstr
??3@YAXPAX@Z
_CxxThrowException
memmove
ceil
_beginthreadex
calloc
free
ws2_32
socket
htons
connect
setsockopt
send
select
closesocket
recv
ntohs
WSAStartup
WSACleanup
gethostbyname
Sections
.text Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ