Static task
static1
Behavioral task
behavioral1
Sample
d2da3ba1c623b199c650d2fca708fccd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2da3ba1c623b199c650d2fca708fccd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d2da3ba1c623b199c650d2fca708fccd_JaffaCakes118
-
Size
116KB
-
MD5
d2da3ba1c623b199c650d2fca708fccd
-
SHA1
39160f19deecd3157a98be2f4073beeef3411997
-
SHA256
725ac03f23cf7d43d131e334759724fef5e6bda60a56cee8e5d523b15e82c67b
-
SHA512
6091b2313b7ab139328015225291c32a8af0bcaef77c0fa2a268d3f325412b1b9a55e762afd8c3277dc495e45567adab6f337739ca5f3376398438080ab2dbdc
-
SSDEEP
3072:Hm8dApyoNqyTkCAu+5pDU9LpyYVoSqYkt:Hm8dAppq7CAu+/sLpty
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2da3ba1c623b199c650d2fca708fccd_JaffaCakes118
Files
-
d2da3ba1c623b199c650d2fca708fccd_JaffaCakes118.dll windows:4 windows x86 arch:x86
8c32a330ea56828779e4ab41eec61764
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
GetWindowsDirectoryA
DeleteFileA
FindNextFileA
ReadFile
GetComputerNameA
GetLastError
IsBadReadPtr
CreateThread
OutputDebugStringA
VirtualProtect
GetProcAddress
LoadLibraryA
Module32Next
SetFilePointer
GetCurrentProcessId
GetLocalTime
lstrcmpA
GetFileSize
CopyFileA
FreeLibrary
ExitProcess
GetCommandLineA
GlobalAddAtomA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
MoveFileExA
GlobalFindAtomA
GetModuleFileNameA
SetStdHandle
GetOEMCP
GetACP
FlushFileBuffers
WriteFile
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
GetPrivateProfileIntA
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
CloseHandle
VirtualFree
GetModuleHandleA
Sleep
VirtualAlloc
GetFileAttributesA
FindFirstFileA
Module32First
FindClose
GetCPInfo
GetStringTypeW
GetStringTypeA
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapReAlloc
HeapAlloc
HeapFree
GetVersion
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
user32
FindWindowA
GetWindowThreadProcessId
ExitWindowsEx
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteExA
shlwapi
PathRemoveFileSpecA
wininet
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
HttpAddRequestHeadersA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ