Static task
static1
Behavioral task
behavioral1
Sample
d32035c5e7da667a9726c9a507894971_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d32035c5e7da667a9726c9a507894971_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d32035c5e7da667a9726c9a507894971_JaffaCakes118
-
Size
112KB
-
MD5
d32035c5e7da667a9726c9a507894971
-
SHA1
bd8cdf083ed0264baffdd4baa09bbd4468a7348d
-
SHA256
be47d9dd58442fabe3c9874f8404cd38add82f866b168ef23b906482eb99d154
-
SHA512
704f10daf7eef4dbf59af66828aee24d1b0e7463093a8b71cb404d1ed1f98ae5a321601982a498d7025c243e52928123287c2564d1df98d8ff9b779d94a3e614
-
SSDEEP
1536:75INvuDjM4ZIjGvwA2abRLaby+KF9CgqEFi387n8JWXSESwQ0Ohijr4:O20bjoV2sRmby+KFz9FiMb8JWtQbgr4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d32035c5e7da667a9726c9a507894971_JaffaCakes118
Files
-
d32035c5e7da667a9726c9a507894971_JaffaCakes118.dll windows:4 windows x86 arch:x86
7ac8e6a9cf987c395e73f3667a29b070
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
htons
WSAUnhookBlockingHook
WSCDeinstallProvider
closesocket
socket
WSAGetLastError
gethostbyname
connect
user32
ShowWindow
SetUserObjectSecurity
SetSystemCursor
SetRect
RemoveMenu
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClassA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
TranslateMessage
GetKeyState
GetForegroundWindow
GetCaretPos
EnumPropsA
EmptyClipboard
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CharToOemA
CharLowerW
CharLowerBuffA
BeginDeferWindowPos
UpdateWindow
GetTopWindow
kernel32
GetTempPathW
lstrcmpA
WaitForMultipleObjectsEx
TlsGetValue
SetFileTime
SetEnvironmentVariableA
ReadFile
OpenJobObjectW
OpenEventW
MulDiv
HeapCreate
HeapAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetTimeZoneInformation
GetSystemInfo
Beep
BindIoCompletionCallback
CloseHandle
CreateSemaphoreA
DeleteCriticalSection
DuplicateHandle
EnumTimeFormatsA
ExitProcess
FindAtomA
FindAtomW
FindNextVolumeW
FlushConsoleInputBuffer
FormatMessageA
GetBinaryTypeA
GetCommandLineA
GetConsoleAliasA
GetConsoleOutputCP
GetCurrentProcessId
GetFileAttributesExA
GetModuleHandleA
GetPrivateProfileSectionW
GetStringTypeExA
GetSystemDefaultLangID
advapi32
LsaRemoveAccountRights
BuildExplicitAccessWithNameW
CancelOverlappedAccess
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaSetInformationTrustedDomain
AddAccessDeniedAce
LookupPrivilegeNameW
I_ScSetServiceBitsA
GetTrusteeNameW
GetSecurityDescriptorDacl
GetAclInformation
GetAce
FileEncryptionStatusA
dinput
DirectInputCreateW
shell32
SHFileOperationW
ShellExecuteA
SHGetSpecialFolderPathW
ole32
PropVariantClear
StgPropertyLengthAsVariant
IsEqualGUID
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
winmm
waveOutUnprepareHeader
timeBeginPeriod
mod32Message
mmioInstallIOProcA
waveOutRestart
midiOutSetVolume
midiInStart
WOW32DriverCallback
PlaySoundW
waveInStart
waveInGetDevCapsA
timeKillEvent
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ