Static task
static1
Behavioral task
behavioral1
Sample
d31fe4fcc3f89847ba45481dc39a18c6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d31fe4fcc3f89847ba45481dc39a18c6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d31fe4fcc3f89847ba45481dc39a18c6_JaffaCakes118
-
Size
16KB
-
MD5
d31fe4fcc3f89847ba45481dc39a18c6
-
SHA1
3b4447b8564ebbc0adbf8224a22898976cbd6db3
-
SHA256
a19a903841a8a886e56fcdc68636e9b7ddd63950de7698c5bc09cac01d9be083
-
SHA512
99d6a10c00456f58311effc220f5821dc49cc1f383b86b41dc6f282385b8322a339e35aab00f8759d27aee2a3004954ae8b11728adb202ef40caab539b557c50
-
SSDEEP
384:M0WWW+JaET6apGrB9QdvGSqZ2f0W1u7PHd:H6apGTg5qZVD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d31fe4fcc3f89847ba45481dc39a18c6_JaffaCakes118
Files
-
d31fe4fcc3f89847ba45481dc39a18c6_JaffaCakes118.dll windows:4 windows x86 arch:x86
4cc9d3afe33dc7a7bea23961d3cac9c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
FindFirstFileA
VirtualProtectEx
Module32Next
Module32First
ReadFile
GetModuleFileNameA
CreateThread
VirtualFreeEx
GetPrivateProfileStringA
LoadLibraryA
WinExec
TerminateProcess
GetCurrentProcess
GetCurrentProcessId
OpenProcess
CreateMutexA
GetLastError
ReleaseMutex
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetSystemDirectoryA
lstrlenA
GetModuleHandleA
GetProcAddress
CreateRemoteThread
WaitForSingleObject
WriteFile
CloseHandle
GetTempPathA
Sleep
GetTickCount
user32
GetWindowThreadProcessId
EnumWindows
wsprintfA
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
gdi32
CreateFontIndirectA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shlwapi
StrStrIA
wininet
InternetCloseHandle
msvcrt
_itoa
memcpy
strcmp
??2@YAPAXI@Z
strstr
strncat
strcat
strlen
memset
strcpy
??3@YAXPAX@Z
_purecall
Sections
.bss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ