droqp
Static task
static1
Behavioral task
behavioral1
Sample
da382103fc92cf9b2ae3e979644fcd20_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da382103fc92cf9b2ae3e979644fcd20_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
da382103fc92cf9b2ae3e979644fcd20_JaffaCakes118
-
Size
33KB
-
MD5
da382103fc92cf9b2ae3e979644fcd20
-
SHA1
533946e36206149f4203df577a7ca991a6ee17ea
-
SHA256
434a42988804325016032c19d2583b73b40b68b1b6e601e620729683e9a8750d
-
SHA512
5faf12ebb9274b6092845f70955d63ed9f4dd9528d0b5d0f2255efbcc24d283517e753c5e7eae440a3c481e3d426176188b2cbe1c429e1522dcfd77ddc7e3465
-
SSDEEP
192:HD+CYkUoJzICP4hol2cvYkj7INqHQt+64iiCK7NR1APVoQg7Ft4kYw2Y9SPsuMw6:HtYIJrPsXiPD1WVo99uMySMzp4y8ON
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da382103fc92cf9b2ae3e979644fcd20_JaffaCakes118
Files
-
da382103fc92cf9b2ae3e979644fcd20_JaffaCakes118.dll windows:4 windows x86 arch:x86
a730ce419093778e0fc3aa9206c80d7f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
OpenProcess
Sleep
Process32Next
Process32First
GetSystemTime
GetCurrentProcess
CreateToolhelp32Snapshot
GetWindowsDirectoryA
OutputDebugStringA
GetSystemDirectoryA
GetLastError
FreeLibrary
GlobalFree
LoadLibraryExA
GlobalAlloc
CreateThread
Module32First
FreeResource
Module32Next
FindResourceA
LoadResource
LockResource
CreateFileA
SizeofResource
WriteFile
CloseHandle
advapi32
RegOpenKeyExA
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
shell32
ShellExecuteA
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
msvcrt
strcat
strstr
_stricmp
strcpy
strlen
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
Exports
Exports
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ