Static task
static1
Behavioral task
behavioral1
Sample
d4f122e56e96cbe4a82dff7db7f85ced_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d4f122e56e96cbe4a82dff7db7f85ced_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d4f122e56e96cbe4a82dff7db7f85ced_JaffaCakes118
-
Size
105KB
-
MD5
d4f122e56e96cbe4a82dff7db7f85ced
-
SHA1
41f86a17552079b2beda1926e42783858e071937
-
SHA256
385f726d9b92564f5ffc84c28f186071e5013bc979d79bd29ea907604939217c
-
SHA512
5103b98bf046d53737f271f19c6460fa703b20cc0e9a56d1ee29550bb89828c0e25dea70ae13f1ba7f765965613d4bfebde1241b4bec5be5bb422bafe97e0bc4
-
SSDEEP
1536:OCsrpx3n49uVNSwbIbFpBYi29EGRlh0UuY/BsvTD/2ZagvEq8E/My88Iou8IhZd:k3n4EVNSwba2NuYpYD/Cag8e88Ilh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4f122e56e96cbe4a82dff7db7f85ced_JaffaCakes118
Files
-
d4f122e56e96cbe4a82dff7db7f85ced_JaffaCakes118.dll windows:4 windows x86 arch:x86
f0766ef8c7e372367b33e4b5cffce77f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TlsGetValue
VirtualFree
VirtualAlloc
GetModuleFileNameA
GetACP
GetEnvironmentStrings
GetCPInfo
GetStdHandle
GetFileType
GetStartupInfoA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
DisableThreadLibraryCalls
SetLastError
LocalAlloc
LocalFree
InterlockedExchange
Sleep
InterlockedCompareExchange
TlsFree
SetEvent
GetCurrentThread
GetSystemTime
SystemTimeToFileTime
HeapAlloc
HeapFree
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
CloseHandle
CancelWaitableTimer
RegisterWaitForSingleObject
SetWaitableTimer
CreateWaitableTimerW
CompareFileTime
WaitForSingleObject
FreeLibrary
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsSetValue
GetCurrentThreadId
ExitProcess
GetVersion
GetOEMCP
GetTickCount
GetCommandLineA
WaitForMultipleObjects
VirtualProtect
user32
LoadStringW
advapi32
LsaNtStatusToWinError
CryptGetUserKey
CryptGetKeyParam
CryptDestroyKey
OpenThreadToken
CryptGetProvParam
CryptReleaseContext
RegCloseKey
SetThreadToken
ole32
CoCreateInstance
CLSIDFromString
CoTaskMemFree
CoTaskMemAlloc
msvcrt
_adjust_fdiv
_XcptFilter
memcpy
mbstowcs
_stricmp
towupper
_vsnwprintf
memset
_initterm
malloc
free
_except_handler3
__CxxFrameHandler
strchr
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Ostd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ