dbg0sym3.p2d3b4
Static task
static1
Behavioral task
behavioral1
Sample
d107a6fd52c3c386b0c33c39b3ac739d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d107a6fd52c3c386b0c33c39b3ac739d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d107a6fd52c3c386b0c33c39b3ac739d_JaffaCakes118
-
Size
124KB
-
MD5
d107a6fd52c3c386b0c33c39b3ac739d
-
SHA1
2aa2c574c17e3baeee71577513676643454ace77
-
SHA256
30b5d1031d951b58a9c1be3072c1b0264918f823894d1ce39284b0e20009607d
-
SHA512
77a53f99435013a25de2e01477f89c35e5d15a5f9e70aedf2f001aaa1b696fd049c730b04d86ea3fcf76b1064a38c929d7905b72a3a867081b469737624d21e2
-
SSDEEP
3072:jP6ikzkv/PFhqf2B09JtAHKDFTcVfqWLFHqv:+yHu/9FFTcRqB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d107a6fd52c3c386b0c33c39b3ac739d_JaffaCakes118
Files
-
d107a6fd52c3c386b0c33c39b3ac739d_JaffaCakes118.dll windows:4 windows x86 arch:x86
53cc44d3bba4a0cebb1c8d7cd25dc354
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LCMapStringW
HeapReAlloc
CreateTimerQueueTimer
ResetEvent
SetLastError
CreateFileMappingW
RaiseException
WriteFile
LoadLibraryExW
VirtualProtect
DuplicateHandle
GetEnvironmentStrings
GetSystemInfo
WaitForSingleObject
GetStdHandle
TerminateProcess
GetTickCount
InterlockedCompareExchange
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsA
HeapCreate
ConnectNamedPipe
GetCurrentProcessId
GetStartupInfoA
Sleep
IsBadCodePtr
InterlockedDecrement
LeaveCriticalSection
GetCPInfo
CloseHandle
MapViewOfFile
GetACP
GetOEMCP
MultiByteToWideChar
IsBadReadPtr
HeapFree
QueryPerformanceCounter
EnterCriticalSection
CreateNamedPipeA
CreateMutexW
GetCurrentThreadId
GetStringTypeW
LoadLibraryA
GetModuleHandleA
LCMapStringA
SetEvent
GetFileType
DeleteTimerQueueTimer
VirtualAlloc
UnhandledExceptionFilter
InterlockedExchangeAdd
CreateThread
DeleteCriticalSection
RtlUnwind
ReadFile
InterlockedExchange
HeapAlloc
GetStringTypeA
FreeEnvironmentStringsW
GetLocaleInfoA
VirtualQuery
SetHandleCount
HeapSize
HeapDestroy
GetSystemTimeAsFileTime
lstrcatW
GetCurrentProcess
InterlockedIncrement
WideCharToMultiByte
SetUnhandledExceptionFilter
GetVersionExA
DisconnectNamedPipe
GetModuleFileNameA
OpenProcess
InitializeCriticalSection
ReleaseMutex
lstrcpyW
UnmapViewOfFile
GetLastError
WaitForMultipleObjects
VirtualFree
CreateEventA
CopyFileA
IsBadWritePtr
GetProcAddress
ExitProcess
user32
wsprintfW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Exports
Exports
tcnlgjnecxmndozlqodectuqewfkzlfnxizeicrnbtvnryhsvukjrifreqnmukvvmtktxaxuqddoqkrziuqsql
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ