Static task
static1
Behavioral task
behavioral1
Sample
dbb06a340d286d683523707578ecea2d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbb06a340d286d683523707578ecea2d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dbb06a340d286d683523707578ecea2d_JaffaCakes118
-
Size
187KB
-
MD5
dbb06a340d286d683523707578ecea2d
-
SHA1
16668cf040c48b5a835c9a398f47d714fa7db2b4
-
SHA256
75d44951cd552af28107b57261946a8c8b577a9599262eb72f180163a74c9c95
-
SHA512
5ba1b860e052fc548bbd87ef24c41cef1e5d9eb13ea60d425f82910050238ca3c44e2e7bdd6ee1658a7c79cce43029effec4c40fbfc6365b900f70730121ca82
-
SSDEEP
3072:ij0eoTf6C3cIZrT0YyOeNLoVhx7amOH1tHhlMlfkYrI:W0est37ZNyOeNcXx7aTH1tHhlMlfk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbb06a340d286d683523707578ecea2d_JaffaCakes118
Files
-
dbb06a340d286d683523707578ecea2d_JaffaCakes118.dll windows:4 windows x86 arch:x86
a2a8c1db2cc9acd7ba5f56609e499fcf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetFileSize
ReadFile
ExitThread
FindAtomA
GlobalFree
Sleep
GetCommandLineA
DeleteFileW
CreateDirectoryA
GetLastError
OpenFileMappingA
WriteFile
CopyFileW
GetStdHandle
ReadConsoleA
DeleteFileA
DeleteAtom
DeleteAtom
CreateDirectoryA
ReadConsoleA
CopyFileA
GlobalFree
FindFirstFileA
SetLastError
ExitThread
GetConsoleMode
GetFileTime
CopyFileExW
OpenFileMappingA
GetStdHandle
GetCommandLineA
WriteFile
DeleteFileA
comctl32
ImageList_LoadImage
ImageList_Merge
ImageList_DrawEx
ImageList_Remove
ImageList_AddIcon
ImageList_GetDragImage
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_LoadImageA
ImageList_DragEnter
ImageList_Copy
ImageList_Replace
ImageList_Read
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetIcon
ImageList_Destroy
ImageList_AddIcon
ImageList_Draw
ImageList_DrawIndirect
ImageList_GetIcon
ImageList_Copy
ImageList_DragShowNolock
ImageList_LoadImageA
ImageList_Remove
ImageList_ReplaceIcon
ImageList_BeginDrag
ImageList_LoadImage
ImageList_Read
ImageList_DragEnter
advapi32
RegLoadKeyA
RegDeleteValueW
RegOpenKeyExA
RegEnumValueA
RegDeleteKeyW
RegDeleteValueA
RegEnumKeyW
RegGetKeySecurity
RegEnumValueW
RegReplaceKeyW
RegOpenKeyA
RegDeleteKeyA
RegLoadKeyW
RegQueryValueW
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExW
RegEnumKeyExA
RegOpenKeyW
RegQueryValueExW
RegQueryValueA
RegFlushKey
RegEnumKeyExW
RegEnumKeyW
RegOpenKeyA
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyW
RegLoadKeyA
RegQueryInfoKeyA
RegEnumValueW
RegReplaceKeyW
RegEnumValueA
RegQueryValueExA
RegEnumValueA
RegOpenKeyA
RegQueryInfoKeyW
RegLoadKeyW
RegCreateKeyExA
RegQueryValueW
RegCreateKeyExW
RegEnumKeyW
RegDeleteValueW
RegEnumValueW
RegOpenKeyA
RegOpenKeyExW
RegOpenKeyW
RegQueryInfoKeyA
RegQueryValueExA
RegDeleteValueA
RegQueryValueExW
RegEnumValueW
RegReplaceKeyW
RegReplaceKeyA
RegLoadKeyW
RegDeleteValueA
RegQueryValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyA
RegDeleteValueW
RegCreateKeyExW
RegLoadKeyW
RegEnumKeyExA
RegReplaceKeyW
RegFlushKey
RegEnumValueW
user32
EndDialog
GetWindowTextA
GetCursor
AppendMenuA
GetWindowTextLengthA
DrawIcon
CalcMenuBar
GetDlgItem
DrawIconEx
IsMenu
GetDC
DrawTextA
IsWindow
InsertMenuA
EndDialog
CloseWindow
AlignRects
LoadCursorA
GetMenu
CopyRect
GetCursor
GetWindowTextLengthA
GetDlgItem
IsMenu
DialogBoxParamA
LoadMenuA
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bbs Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: - Virtual size: 247B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ