ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
d6ca05188d732bb8f2ef30a79deda102_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d6ca05188d732bb8f2ef30a79deda102_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d6ca05188d732bb8f2ef30a79deda102_JaffaCakes118
-
Size
48KB
-
MD5
d6ca05188d732bb8f2ef30a79deda102
-
SHA1
814b53e970e2c544e31a71a8dd0e0405ba08cc5b
-
SHA256
8a97675cf40401b38eae0100dbfa750a1a02202415455c7c0f35d5cd03e7c783
-
SHA512
84bea84685da069be9c3a01be02fb772cfc8e8ec574bd1ab480f6fc32fe5f5e10bf5e89b006815620ae57d77b8614f1778909da78e27457b25be0b51726b8480
-
SSDEEP
768:EjmocHAzXJwY6COMG0uesPyOkYnelOb12CL:xAzuTUuTPHn6ObcCL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6ca05188d732bb8f2ef30a79deda102_JaffaCakes118
Files
-
d6ca05188d732bb8f2ef30a79deda102_JaffaCakes118.dll windows:4 windows x86 arch:x86
9888b418315d291df988bcd4a77fe911
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_strnicmp
_stricmp
_strlwr
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memcpy
_adjust_fdiv
_initterm
malloc
_onexit
__dllonexit
memmove
memchr
_beginthread
sscanf
atoi
strchr
strpbrk
strstr
??2@YAPAXI@Z
sprintf
_snprintf
_beginthreadex
strncpy
??3@YAXPAX@Z
_EH_prolog
__CxxFrameHandler
_except_handler3
free
_strdup
??1type_info@@UAE@XZ
time
localtime
strftime
fopen
fprintf
fflush
fclose
shlwapi
SHGetValueA
SHSetValueA
PathFileExistsA
wininet
InternetCrackUrlA
ws2_32
setsockopt
recv
gethostbyname
listen
htonl
WSACleanup
send
shutdown
closesocket
inet_ntoa
WSAStringToAddressA
htons
connect
accept
bind
WSAStartup
socket
kernel32
ReadFile
ResetEvent
WriteFile
GetLastError
WaitForSingleObject
SetEvent
CancelIo
GetTickCount
CloseHandle
CreateEventA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
CreateFileA
GetSystemDirectoryA
ExpandEnvironmentStringsA
OpenProcess
GetCurrentProcessId
GetCurrentProcess
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetOverlappedResult
EnterCriticalSection
GetVolumeInformationA
GetCurrentThreadId
GetWindowsDirectoryA
user32
PeekMessageA
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
advapi32
SetServiceStatus
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegisterServiceCtrlHandlerA
Exports
Exports
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ