dbg0sym3.p2d3b4
Static task
static1
Behavioral task
behavioral1
Sample
da04b7a83ab3507274255dc4cdb56ad8_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da04b7a83ab3507274255dc4cdb56ad8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
da04b7a83ab3507274255dc4cdb56ad8_JaffaCakes118
-
Size
118KB
-
MD5
da04b7a83ab3507274255dc4cdb56ad8
-
SHA1
6d2bf7a8e12c63b541141228f0eed767b95565f2
-
SHA256
11fc8a480bffaebcb1494172a7ff3767985f9771b2e75276cc2f04d177e971a1
-
SHA512
0630bdb652b46da1ffa1284b241bc753bd5bf8ee9483ad60061a6cc2018b03b94d9c45d7773da0cf3f3deaf188b84eab41669c6e991bf017ebeabf472f4869e3
-
SSDEEP
3072:3pZ7BOpYRVIr7mKKGQ1+/e5QHLFHqukkkkfkkkk4kkkZkk:33OPHmFPPqNkkkkfkkkk4kkkZkk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da04b7a83ab3507274255dc4cdb56ad8_JaffaCakes118
Files
-
da04b7a83ab3507274255dc4cdb56ad8_JaffaCakes118.dll windows:4 windows x86 arch:x86
53cc44d3bba4a0cebb1c8d7cd25dc354
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LCMapStringW
HeapReAlloc
CreateTimerQueueTimer
ResetEvent
SetLastError
CreateFileMappingW
RaiseException
WriteFile
LoadLibraryExW
VirtualProtect
DuplicateHandle
GetEnvironmentStrings
GetSystemInfo
WaitForSingleObject
GetStdHandle
TerminateProcess
GetTickCount
InterlockedCompareExchange
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsA
HeapCreate
ConnectNamedPipe
GetCurrentProcessId
GetStartupInfoA
Sleep
IsBadCodePtr
InterlockedDecrement
LeaveCriticalSection
GetCPInfo
CloseHandle
MapViewOfFile
GetACP
GetOEMCP
MultiByteToWideChar
IsBadReadPtr
HeapFree
QueryPerformanceCounter
EnterCriticalSection
CreateNamedPipeA
CreateMutexW
GetCurrentThreadId
GetStringTypeW
LoadLibraryA
GetModuleHandleA
LCMapStringA
SetEvent
GetFileType
DeleteTimerQueueTimer
VirtualAlloc
UnhandledExceptionFilter
InterlockedExchangeAdd
CreateThread
DeleteCriticalSection
RtlUnwind
ReadFile
InterlockedExchange
HeapAlloc
GetStringTypeA
FreeEnvironmentStringsW
GetLocaleInfoA
VirtualQuery
SetHandleCount
HeapSize
HeapDestroy
GetSystemTimeAsFileTime
lstrcatW
GetCurrentProcess
InterlockedIncrement
WideCharToMultiByte
SetUnhandledExceptionFilter
GetVersionExA
DisconnectNamedPipe
GetModuleFileNameA
OpenProcess
InitializeCriticalSection
ReleaseMutex
lstrcpyW
UnmapViewOfFile
GetLastError
WaitForMultipleObjects
VirtualFree
CreateEventA
CopyFileA
IsBadWritePtr
GetProcAddress
ExitProcess
user32
wsprintfW
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
Exports
Exports
icbkslkhlojmnhelenycszjqxibpmttoitkavflxfjjbzcqfykkdupvrhltmsusnrabpvrvzxczclvwdv
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ