Static task
static1
Behavioral task
behavioral1
Sample
db9eaba8ce8c40bb86a3e294722b5b7b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db9eaba8ce8c40bb86a3e294722b5b7b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
db9eaba8ce8c40bb86a3e294722b5b7b_JaffaCakes118
-
Size
248KB
-
MD5
db9eaba8ce8c40bb86a3e294722b5b7b
-
SHA1
971a07a1b454ce23b31b6175ecfe55785945e0b7
-
SHA256
9653dd6c3e8fa8fc7aee567dfde5cf1d11d8281b4ef519755a3814e2ac59e712
-
SHA512
60468608a645e21bef73be20d957bb8626bbd75bc213ee19ad44fc31a6039f1782d30dba93cd60245137c6ccea45e765b11b56c25795281abb213334e4df5af0
-
SSDEEP
6144:zUkM/80i/zb308zo2ank5TxwZEqqDLujtvN:zUkWMEEanOT+ZBqnujt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db9eaba8ce8c40bb86a3e294722b5b7b_JaffaCakes118
Files
-
db9eaba8ce8c40bb86a3e294722b5b7b_JaffaCakes118.dll windows:4 windows x86 arch:x86
1c9de428a7eb3037c421011c01c78290
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
_llseek
_lread
GlobalFree
GetTempFileNameW
GetTempPathW
InterlockedIncrement
LocalAlloc
lstrcmpiW
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetProcessHeap
InterlockedCompareExchange
LoadLibraryExA
InterlockedExchange
Sleep
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
GetModuleHandleW
ReadFile
CreateMailslotW
SetConsoleMode
WriteConsoleW
ReadConsoleW
HeapValidate
CompareStringW
GetStdHandle
GetConsoleMode
FormatMessageW
GetConsoleOutputCP
WideCharToMultiByte
GetThreadLocale
GetComputerNameW
GetComputerNameExW
GetLocalTime
CreateEventW
WaitForSingleObjectEx
SetThreadPriority
CreateThread
GlobalAlloc
ResumeThread
GetThreadPriority
GetCurrentThread
SetPriorityClass
WaitForSingleObject
CreateProcessW
MapViewOfFile
lstrcpyW
lstrcatW
UnmapViewOfFile
ResetEvent
SetEvent
GetPriorityClass
CreateFileMappingW
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
HeapAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetModuleFileNameA
GetStartupInfoA
SetHandleCount
GetModuleHandleA
VirtualQuery
GetVersionExA
GetSystemInfo
RtlUnwind
CreateFileW
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
IsDBCSLeadByte
lstrlenW
InterlockedDecrement
ExpandEnvironmentStringsA
lstrcmpiA
GetFileAttributesA
MultiByteToWideChar
lstrlenA
GetCPInfo
GetACP
CloseHandle
CreateFileA
DeleteFileA
GetDriveTypeA
WriteFile
GetFileSize
GetShortPathNameA
GetFileType
CreateDirectoryA
LocalFree
LoadLibraryW
GetShortPathNameW
CopyFileA
SetFileAttributesA
MulDiv
CreateFileMappingA
ExitProcess
GetSystemDefaultLangID
GetFullPathNameA
GetPrivateProfileStringA
VirtualProtect
GetExitCodeProcess
GetCommandLineA
user32
GetMenuItemInfoW
InsertMenuW
GetMenuItemCount
DestroyMenu
RemoveMenu
SetMenuDefaultItem
ReleaseDC
GetDesktopWindow
GetActiveWindow
EnableMenuItem
GetMenu
PostMessageA
GetFocus
IsWindowUnicode
GetWindowTextLengthW
GetWindowTextW
EndDialog
MessageBoxW
ScreenToClient
MoveWindow
wsprintfW
DialogBoxParamA
DialogBoxParamW
IsWindow
GetDlgItem
GetClientRect
InvalidateRect
SetWindowPos
GetParent
SetFocus
GetWindowRect
EnableWindow
SendMessageA
GetWindowLongA
SetCursor
LoadCursorA
DestroyWindow
GetClassNameA
GetWindow
TrackPopupMenu
SendDlgItemMessageA
PeekMessageA
SetClassLongA
CharUpperW
SetWindowTextW
SendMessageW
RegisterClipboardFormatW
DeleteMenu
WinHelpA
CreatePopupMenu
CharNextA
SetWindowTextA
GetWindowTextLengthA
IsWindowEnabled
SetWindowLongA
EnumChildWindows
GetSystemMetrics
LoadBitmapA
DefWindowProcA
GetDC
CheckMenuItem
SetMenuItemInfoW
IsRectEmpty
InsertMenuItemW
LoadStringW
SetDlgItemTextW
CharToOemA
CharPrevA
SetForegroundWindow
UpdateWindow
LoadImageA
MessageBoxA
SetDlgItemTextA
CharLowerA
LoadStringA
GetWindowTextA
advapi32
ReportEventA
RegisterEventSourceA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
EqualSid
ChangeServiceConfigW
StartServiceW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
RegDeleteKeyW
RegCreateKeyExW
LookupAccountSidW
GetSidSubAuthorityCount
GetSidSubAuthority
RegOpenKeyExW
LsaOpenPolicy
LsaQueryInformationPolicy
LsaFreeMemory
SystemFunction016
SystemFunction006
ReportEventW
RegisterEventSourceW
DeregisterEventSource
gdi32
CreateFontIndirectW
GetObjectA
DeleteDC
GetTextExtentPoint32W
SelectObject
CreateICA
GetDeviceCaps
GetTextMetricsA
DeleteObject
CreateFontIndirectA
ole32
CoInitializeEx
CoGetClassObject
CoTaskMemFree
CoCreateInstance
rpcrt4
NdrClientCall2
I_RpcMapWin32Status
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcStringFreeW
RpcBindingFree
Sections
.text Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ