Static task
static1
Behavioral task
behavioral1
Sample
d73d0cde53deb8f15bb6c02ffbb0e04a_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d73d0cde53deb8f15bb6c02ffbb0e04a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d73d0cde53deb8f15bb6c02ffbb0e04a_JaffaCakes118
-
Size
116KB
-
MD5
d73d0cde53deb8f15bb6c02ffbb0e04a
-
SHA1
20664e3e2de351b56b267f1347b588fdab772af1
-
SHA256
1cb636d650a585808abca5483a2b2d192d24f2d2cc813628a516c9c031acd37f
-
SHA512
ace3d8754627dbd4b18ec54a484cd0abf27182d6a73393a2344415cc260bf4a4925f5c547d29bf5a4931897db67eb73850d3005e79d70964b6c98c8a2644e167
-
SSDEEP
1536:iSekcwcB270S4CN0MRKdIOheQeBZ53MOn1btWvZImb3qEPHqAOT2IyIthlNdJPt:B5Qd4zkyOhoBIgbtW2vYHqDFthlNdD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d73d0cde53deb8f15bb6c02ffbb0e04a_JaffaCakes118
Files
-
d73d0cde53deb8f15bb6c02ffbb0e04a_JaffaCakes118.dll windows:4 windows x86 arch:x86
1b4007377be8340697d860dac97f990d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateEventW
WideCharToMultiByte
lstrlenW
GetTickCount
lstrcmpW
CloseHandle
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCurrentProcess
GetLocaleInfoA
InterlockedDecrement
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
LoadLibraryA
GetCPInfo
GetOEMCP
GetACP
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetSystemInfo
GetModuleHandleA
FormatMessageW
LocalAlloc
LocalFree
GlobalLock
IsBadReadPtr
IsBadWritePtr
GlobalUnlock
GlobalFree
GetModuleFileNameA
DisableThreadLibraryCalls
GetVersionExA
InterlockedIncrement
MultiByteToWideChar
GlobalAlloc
VirtualProtect
GetStringTypeW
GetCommandLineA
GetProcAddress
ExitProcess
VirtualQuery
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
user32
FillRect
wsprintfW
InvalidateRect
GetFocus
GetWindowLongW
GetDC
DestroyWindow
GetParent
SetFocus
GetKeyState
CallWindowProcW
EndPaint
ReleaseDC
GetSysColor
BeginPaint
EnableWindow
SendMessageW
GetClientRect
SetTimer
CreateWindowExW
SetWindowLongW
advapi32
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
gdi32
SetBkColor
GetCharWidthW
TextOutW
SetTextColor
CreateFontIndirectW
SelectObject
Rectangle
CreateSolidBrush
DeleteObject
ole32
CoTaskMemFree
ReleaseStgMedium
StringFromCLSID
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ