Static task
static1
Behavioral task
behavioral1
Sample
d422e3f4a90b744535d1af78f95cc59d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d422e3f4a90b744535d1af78f95cc59d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d422e3f4a90b744535d1af78f95cc59d_JaffaCakes118
-
Size
152KB
-
MD5
d422e3f4a90b744535d1af78f95cc59d
-
SHA1
bf8bc720fa07c1c64388c3673ce24f6a2d9d3a30
-
SHA256
c4f6e79d2857c6736f1e8504868aa20a5dd6ed18beaf0d66170cedd0f188c340
-
SHA512
ccf04bf92b0556928f753bec3bbb53d69b790d774559476b2745406a80474f967137a4146d97f27afc787345900f57cac5077e3f55d024e6048d54201143298b
-
SSDEEP
3072:nWS67297SIov0rYVuiO6A+2OtikOjT1gMcEXH76io3Q:Wp7gqmiOe2y3O/1LSQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d422e3f4a90b744535d1af78f95cc59d_JaffaCakes118
Files
-
d422e3f4a90b744535d1af78f95cc59d_JaffaCakes118.dll windows:4 windows x86 arch:x86
d712b7de6e99efe30dd23bfb2542771d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
IsBadReadPtr
FlushInstructionCache
GetCurrentThread
VirtualProtect
FreeLibrary
GetLastError
GetProcessVersion
CloseHandle
WaitForSingleObject
SetThreadPriority
GetFileType
GetFileSize
ResetEvent
GetCurrentThreadId
FindFirstFileA
GetModuleFileNameA
GetThreadPriority
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSection
GetExitCodeProcess
OpenProcess
SetEvent
WaitForMultipleObjects
CreateEventA
HeapFree
GetProcessHeap
CreateThread
HeapAlloc
FindClose
FindNextFileA
MultiByteToWideChar
GetModuleHandleA
GetFileTime
CreateFileA
HeapReAlloc
HeapValidate
IsBadWritePtr
lstrlenW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
TerminateProcess
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
LoadLibraryA
GetProcAddress
lstrlenA
GetCurrentProcess
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
SetStdHandle
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
Sleep
FlushFileBuffers
RaiseException
InterlockedDecrement
InterlockedIncrement
MoveFileA
GetCommandLineA
GetVersion
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetStartupInfoA
SetFilePointer
ReadFile
WriteFile
WideCharToMultiByte
ExitProcess
user32
SetFocus
GetWindowThreadProcessId
GetKeyboardLayout
MapVirtualKeyExA
DispatchMessageA
TranslateMessage
GetClientRect
GetCursor
SetLastErrorEx
GetMessageA
SetForegroundWindow
ScreenToClient
SetCursorPos
SetWindowLongA
SetRectEmpty
SetThreadDesktop
IsRectEmpty
GetWindowDC
GetWindowRect
FindWindowA
SetActiveWindow
GetIconInfo
SetRect
SetWindowPos
GetForegroundWindow
gdi32
SetRectRgn
advapi32
RevertToSelf
oleaut32
SysAllocStringLen
SysFreeString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SYNC Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ