Static task
static1
Behavioral task
behavioral1
Sample
dcc1c1471da78c1385583db07b96486d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dcc1c1471da78c1385583db07b96486d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dcc1c1471da78c1385583db07b96486d_JaffaCakes118
-
Size
130KB
-
MD5
dcc1c1471da78c1385583db07b96486d
-
SHA1
5b79be0ae766c44e13c2ff8c572bdf7af59e5f16
-
SHA256
c3dbaf73f498cc01e906e086ae1c1d078bcef1723085aa4355a17c0ba4e75ca3
-
SHA512
2eaed7d7fd3df06fce116d9c9e091523dea810c571af083e9d2abe7418933a20afee1d7cd3adf8cbb92cd6f5cd1adc8c576b5060aa7de4c0f306d28b7aad192d
-
SSDEEP
3072:Er8CeiF5Ee2BtB0pA3uomokr/TUAU9hh1rDos1q:Er8CDruB0pIhGHUH9DB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcc1c1471da78c1385583db07b96486d_JaffaCakes118
Files
-
dcc1c1471da78c1385583db07b96486d_JaffaCakes118.dll windows:5 windows x86 arch:x86
7d36becbbfbf2f1de297958375849b06
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ShowScrollBar
SetWindowTextW
SetWindowLongW
ShowWindow
SetTimer
SetMenuItemInfoW
SetMenu
TileWindows
TrackPopupMenuEx
TranslateAcceleratorA
wsprintfA
UpdateWindow
UpdateLayeredWindow
TranslateMessage
TranslateMDISysAccel
SetWindowLongA
SetDebugErrorLevel
SendMessageW
RemoveMenu
RegisterClassA
CallWindowProcA
PostQuitMessage
PostMessageA
OpenClipboard
NotifyWinEvent
ModifyMenuW
MessageBoxW
MapVirtualKeyA
MapDialogRect
LookupIconIdFromDirectory
LockSetForegroundWindow
LoadIconA
LoadCursorA
LoadBitmapA
LoadAcceleratorsW
LoadAcceleratorsA
KillTimer
IsZoomed
IsWindowEnabled
IsDlgButtonChecked
InvalidateRect
InsertMenuItemA
GetWindowTextA
GetWindowPlacement
GetWindowLongA
GetUserObjectInformationA
GetTitleBarInfo
GetSubMenu
GetMenuItemInfoW
GetMenuItemInfoA
GetMenuItemCount
GetKeyState
GetGUIThreadInfo
GetDlgItem
GetClientRect
GetClassInfoW
GetClassInfoA
GetCapture
FlashWindowEx
FindWindowA
EndPaint
EnableWindow
EmptyClipboard
DrawStateW
DrawMenuBar
DispatchMessageW
DestroyWindow
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
DdeGetLastError
DdeConnectList
CreateWindowExW
CreateWindowExA
CreateMenu
CreateIconIndirect
CreateAcceleratorTableA
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
CharUpperW
CharUpperA
CharPrevA
CharLowerW
TranslateAcceleratorW
advapi32
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
GetUserNameW
ole32
RevokeDragDrop
ReleaseStgMedium
RegisterDragDrop
OleUninitialize
OleInitialize
DoDragDrop
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
comdlg32
PrintDlgA
PageSetupDlgA
GetFileTitleA
kernel32
ReadFile
MultiByteToWideChar
MapViewOfFile
LocalFree
LoadLibraryA
InterlockedIncrement
HeapAlloc
GlobalUnlock
GlobalSize
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVolumeInformationW
GetVolumeInformationA
GetVersionExA
GetUserDefaultLangID
GetTickCount
GetTempPathW
GetSystemTime
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLogicalDriveStringsA
GetLastError
GetFullPathNameA
RemoveDirectoryA
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentProcess
FormatMessageA
FindNextFileA
FindNextChangeNotification
FindFirstFileA
FindFirstChangeNotificationA
FindCloseChangeNotification
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
DeviceIoControl
DeleteFileA
DeleteCriticalSection
CreateFileA
CreateDirectoryA
CopyFileW
CopyFileA
CompareFileTime
WaitForSingleObject
WideCharToMultiByte
lstrcatA
SetEndOfFile
SetEvent
SetFilePointer
SetLastError
SetPriorityClass
SystemTimeToFileTime
UnmapViewOfFile
VirtualAlloc
VirtualProtect
VirtualFree
GetFileSize
msvcrt
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_adjust_fdiv
_beginthreadex
_controlfp
_except_handler3
_exit
_initterm
_onexit
_purecall
_wcsicmp
exit
malloc
memcmp
memcpy
memmove
memset
rand
srand
strlen
wcslen
wcsncmp
free
shell32
SHChangeNotify
SHFileOperationA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SheChangeDirA
ShellExecuteA
SHBrowseForFolderA
Sections
.text Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ