Static task
static1
Behavioral task
behavioral1
Sample
d5be8de95e4baf319101263844fe2a28_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5be8de95e4baf319101263844fe2a28_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d5be8de95e4baf319101263844fe2a28_JaffaCakes118
-
Size
44KB
-
MD5
d5be8de95e4baf319101263844fe2a28
-
SHA1
9021df6f184a9990de0d1cd2d5f6963e441f3584
-
SHA256
9c9c127f1d9bf3bed1beca9e3a7fd26eb432051696d21220b05da53a0a51419d
-
SHA512
5e2507b51982dc497685e934201612b43da8cb372f80f7419e42be29fb9e703d5f2dc2f6351519276423fc006a10b43137b6c1e958b751d1cce5a57aceb888ec
-
SSDEEP
768:XWdRMIGsLkYKtZgn6vHupltmRLAn6YaiVoj6EKLa5aI7:eRMzsLkYkZk6vHuplIR0l7gKK7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5be8de95e4baf319101263844fe2a28_JaffaCakes118
Files
-
d5be8de95e4baf319101263844fe2a28_JaffaCakes118.dll windows:4 windows x86 arch:x86
dea91e8448f038f16c318ee96324ddd0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ExitProcess
GetACP
GetEnvironmentStringsA
GetModuleHandleA
GetOEMCP
GetStartupInfoA
GetSystemDirectoryA
GetTickCount
HeapAlloc
HeapCreate
HeapSize
LeaveCriticalSection
ReadProcessMemory
TlsFree
lstrcatA
lstrcmpiA
lstrlenA
msvcrt
wcscpy
__p__commode
__set_app_type
exit
free
strspn
wcscat
wcscmp
user32
DestroyWindow
GetDesktopWindow
GetSubMenu
RemoveMenu
DeferWindowPos
oleaut32
ClearCustData
SafeArrayDestroy
OleIconToCursor
shlwapi
SHDeleteEmptyKeyA
PathFileExistsA
PathBuildRootA
SHOpenRegStreamA
SHSetValueA
PathGetCharTypeA
PathGetDriveNumberA
StrChrA
Sections
.text Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ