Static task
static1
Behavioral task
behavioral1
Sample
d6d538f3b98ccf3782104ade2ddd8977_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6d538f3b98ccf3782104ade2ddd8977_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d6d538f3b98ccf3782104ade2ddd8977_JaffaCakes118
-
Size
79KB
-
MD5
d6d538f3b98ccf3782104ade2ddd8977
-
SHA1
7f88a4ebf8c12770d973aa3f02728b3044c37b61
-
SHA256
c74e4e8fd7ea29c8452a549fa2c3657aad86fc958bca22c160ff493fa36f9250
-
SHA512
5cfe4f97e2879f54cf590c219f7a2bb7a15bb1408e015c4f6f231eb8691017e0a26801662e0e8a6ac88f479a99adadb4953b76f5b2cda7a251fecfe307c83e5e
-
SSDEEP
1536:ql3HsN9RoMst79VUUFl/bOedk30JlDIG+0o48W0mqeLtDjygqyMTCuv2TUkI6AFq:B92Mst79VTSr0JlJ8ZveEgB6Cuviu6A8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6d538f3b98ccf3782104ade2ddd8977_JaffaCakes118
Files
-
d6d538f3b98ccf3782104ade2ddd8977_JaffaCakes118.dll windows:4 windows x86 arch:x86
fa149e049e45fcda6accc2f94f538c0c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleW
FindResourceW
MapViewOfFileEx
VerLanguageNameA
GetProcAddress
FindVolumeMountPointClose
CreateDirectoryExA
UnmapViewOfFile
GetPrivateProfileSectionA
GetLastError
GetModuleHandleA
GetPrivateProfileStringW
SystemTimeToFileTime
VirtualProtect
ExitProcess
LockFile
InitAtomTable
LoadLibraryA
CreateFileA
VirtualAlloc
msvcrt
_mbccpy
strcoll
strcspn
_close
fscanf
mblen
_wgetdcwd
ispunct
strtol
memcpy
iswpunct
_wspawnvpe
is_wctype
_longjmpex
memset
??4__non_rtti_object@@QAEAAV0@ABV0@@Z
_futime
_getw
user32
SetClipboardData
SetMenuItemInfoW
PrivateExtractIconsA
LoadStringA
RealChildWindowFromPoint
MapWindowPoints
CreateDialogParamW
GetMenuState
RegisterClassExW
ModifyMenuW
EnumDesktopWindows
opengl32
glTexCoord2dv
glTexCoord4i
glRasterPos2i
wglMakeCurrent
glGetTexEnviv
glDrawPixels
glReadBuffer
glFinish
glCullFace
glDebugEntry
glFogf
GlmfEndPlayback
glColor3b
glTexCoord2s
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 894B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sp Size: 512B - Virtual size: 115B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sp0 Size: 1024B - Virtual size: 537B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sp1 Size: 512B - Virtual size: 22B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sp2 Size: 512B - Virtual size: 69B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sp3 Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 62B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ