Static task
static1
Behavioral task
behavioral1
Sample
d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118
-
Size
116KB
-
MD5
d52a1550df6487d500dffb6673b5f1ad
-
SHA1
28551d6fb5656c00887f39a14cf456e3e93624d5
-
SHA256
a6aeed41caa1cd3d3f1ba55e1bbf95babdaf0e5761c39cc4b702ff9795a770c3
-
SHA512
a01eebc887602e28de6f0b0aea5905104ef8e929e1998d410f9401ba473e264a83cb5ddae6506864a36ee5b3c5013fefe1be871b34db4dc11c2b4add1d124ac3
-
SSDEEP
1536:LSicwcHR78S4CN0MRKdIOheQeBZ53MVn1ktFvZImHTqEPHqAOTOIyIthlAdJPt:n5OG4zkyOhoBIHktF2vYHq7FthlAdD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118
Files
-
d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118.dll windows:4 windows x86 arch:x86
1b4007377be8340697d860dac97f990d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateEventW
WideCharToMultiByte
lstrlenW
GetTickCount
lstrcmpW
CloseHandle
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCurrentProcess
GetLocaleInfoA
InterlockedDecrement
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
LoadLibraryA
GetCPInfo
GetOEMCP
GetACP
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetSystemInfo
GetModuleHandleA
FormatMessageW
LocalAlloc
LocalFree
GlobalLock
IsBadReadPtr
IsBadWritePtr
GlobalUnlock
GlobalFree
GetModuleFileNameA
DisableThreadLibraryCalls
GetVersionExA
InterlockedIncrement
MultiByteToWideChar
GlobalAlloc
VirtualProtect
GetStringTypeW
GetCommandLineA
GetProcAddress
ExitProcess
VirtualQuery
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
user32
FillRect
wsprintfW
InvalidateRect
GetFocus
GetWindowLongW
GetDC
DestroyWindow
GetParent
SetFocus
GetKeyState
CallWindowProcW
EndPaint
ReleaseDC
GetSysColor
BeginPaint
EnableWindow
SendMessageW
GetClientRect
SetTimer
CreateWindowExW
SetWindowLongW
advapi32
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
gdi32
SetBkColor
GetCharWidthW
TextOutW
SetTextColor
CreateFontIndirectW
SelectObject
Rectangle
CreateSolidBrush
DeleteObject
ole32
CoTaskMemFree
ReleaseStgMedium
StringFromCLSID
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ