Behavioral task
behavioral1
Sample
dcee4fd17a23dfdf17fb9a14cdff7b35_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
dcee4fd17a23dfdf17fb9a14cdff7b35_JaffaCakes118
-
Size
143KB
-
MD5
dcee4fd17a23dfdf17fb9a14cdff7b35
-
SHA1
5e1c6590472586a1b26e56e518d490ffa7245ba2
-
SHA256
c741bcefdffa056aa61e2faf68e8bb13e485b0e6c2922aeba5fcb2cd543eba1a
-
SHA512
dc5b6bb98c16f72f04c0841a9233e988bd4faddcae1ae512c472450aa68ff07e7c18b6aa5cb8a800ec4edbea8be3c9679784b6b4ed104f94f7af0f1f1ca99cce
-
SSDEEP
3072:lGViYv3843n6MGDmJEOK0kX/qsVBzg3pqi5aCpsgybpzD:8cK84yDmay0zLYa+gf
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcee4fd17a23dfdf17fb9a14cdff7b35_JaffaCakes118
Files
-
dcee4fd17a23dfdf17fb9a14cdff7b35_JaffaCakes118.dll windows:5 windows x86 arch:x86
6127065a9366bfe881a864d488866360
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
wcscmp
malloc
free
strstr
atoi
wcsrchr
??2@YAPAXI@Z
??3@YAXPAX@Z
srand
rand
strtoul
strrchr
memset
memcpy
_except_handler3
shlwapi
SHSetValueA
SHGetValueA
SHDeleteValueA
SHDeleteKeyA
PathFileExistsA
psapi
GetModuleFileNameExA
ws2_32
WSAGetLastError
WSAResetEvent
gethostname
WSAEventSelect
WSACreateEvent
WSARecvFrom
inet_ntoa
htonl
setsockopt
send
WSAStartup
inet_addr
htons
shutdown
sendto
WSACleanup
socket
closesocket
gethostbyname
connect
bind
iphlpapi
GetAdaptersInfo
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetCancelConnection2A
WNetCloseEnum
WNetAddConnection2A
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
gdiplus
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
kernel32
FindClose
WaitForMultipleObjects
FindFirstFileA
SetFileAttributesA
FlushViewOfFile
RemoveDirectoryA
FindNextFileA
GetLogicalDriveStringsA
lstrcpynA
MoveFileA
CreateFileMappingA
UnmapViewOfFile
MapViewOfFile
CreateThread
lstrcpyW
CopyFileA
TransactNamedPipe
GlobalAlloc
GlobalFree
GetLocalTime
SetFileTime
CreateDirectoryA
GetFileAttributesA
GetLogicalDrives
MoveFileExA
ExitProcess
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
SetEndOfFile
FreeLibrary
WaitForSingleObject
SetEvent
GetModuleHandleW
VirtualFree
VirtualQueryEx
WriteFile
Sleep
CreateEventA
ReadFile
GetSystemDirectoryA
ExitThread
MultiByteToWideChar
lstrcmpiA
GetProcAddress
VirtualAlloc
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetTempPathA
DeleteFileA
lstrcpyA
FindResourceA
FreeResource
LoadResource
Process32First
GetTickCount
GetSystemTimeAsFileTime
VirtualProtect
GetDriveTypeA
OpenProcess
SizeofResource
GetExitCodeProcess
CreateProcessA
GetLastError
Process32Next
LockResource
DeviceIoControl
SetNamedPipeHandleState
LoadLibraryExA
CreateToolhelp32Snapshot
GetFileTime
GetVersionExA
LocalFree
WideCharToMultiByte
ConnectNamedPipe
TerminateThread
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
OpenThread
GetCurrentThreadId
GetCurrentProcess
GetVolumeInformationA
TerminateProcess
lstrlenW
lstrcmpiW
WinExec
user32
GetDC
ReleaseDC
wsprintfW
PostMessageA
FindWindowA
wsprintfA
gdi32
BitBlt
CreateCompatibleBitmap
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
advapi32
SetEntriesInAclA
QueryServiceStatus
OpenSCManagerA
ControlService
RegOpenKeyA
RegCloseKey
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
CloseServiceHandle
OpenServiceW
RegSetValueExA
RegQueryValueExA
CreateServiceA
StartServiceA
RegCreateKeyExA
DuplicateTokenEx
CreateProcessAsUserA
AdjustTokenPrivileges
RegFlushKey
RegSaveKeyA
LookupPrivilegeValueA
RegRestoreKeyA
DeleteService
OpenProcessToken
OpenServiceA
GetNamedSecurityInfoA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX1 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE