WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
df5019cdf28bdc2f0758a31c14d31bda_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df5019cdf28bdc2f0758a31c14d31bda_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
df5019cdf28bdc2f0758a31c14d31bda_JaffaCakes118
-
Size
344KB
-
MD5
df5019cdf28bdc2f0758a31c14d31bda
-
SHA1
5fc0193ec0d851ffadbc037836ebd13e64a9de88
-
SHA256
529c1089cec08587e79e450a99aabf2203fd8a04749dd5bc94c8cb8ebe1d7da1
-
SHA512
a6ad71958d683e73645bfbe1671955f76818d3fa54e675b606d9f53e13972e1f249795b9a99a734b8422367a6faa5a8322942360d543b547f4cb6bb28e7cd7f9
-
SSDEEP
6144:Q5z5sWCoD8mvOFdMuedxLAGVAR01jCJNbFdTBw39PrU:qz5s0wmceXAOgNbFdTStY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df5019cdf28bdc2f0758a31c14d31bda_JaffaCakes118
Files
-
df5019cdf28bdc2f0758a31c14d31bda_JaffaCakes118.dll windows:4 windows x86 arch:x86
060125039e22c52bff94b98517bf0c4e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
netapi32
Netbios
kernel32
GetFileAttributesA
GetFileSize
MoveFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCommandLineA
RtlUnwind
ExitProcess
RaiseException
SetStdHandle
GetFileType
GetACP
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetExitCodeProcess
GetLocaleInfoW
SetEnvironmentVariableA
FindFirstFileA
FindClose
InterlockedIncrement
GlobalFlags
GetThreadLocale
GlobalGetAtomNameA
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleFileNameW
GlobalAddAtomA
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
LocalAlloc
DeleteCriticalSection
SetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpA
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleA
GetCurrentThreadId
GetVersion
CompareStringA
InterlockedExchange
CompareStringW
WideCharToMultiByte
lstrlenA
HeapFree
GetProcessHeap
HeapAlloc
MultiByteToWideChar
ReleaseMutex
WaitForSingleObject
CreateMutexA
OpenMutexA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CreateThread
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
OpenProcess
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetLastError
Sleep
GetCurrentProcessId
GetTickCount
CreateProcessA
ExpandEnvironmentStringsA
GetVersionExA
DeleteFileA
CreateDirectoryA
GetSystemDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
SetFileTime
GetFileTime
CreateFileA
HeapSize
CreateFileW
user32
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
LoadCursorA
GetSysColorBrush
GetSystemMetrics
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetTopWindow
UnregisterClassA
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
EnableMenuItem
DestroyMenu
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostQuitMessage
CharUpperA
DispatchMessageA
TranslateMessage
PeekMessageA
PostMessageA
GetWindowThreadProcessId
IsWindowVisible
GetWindow
FindWindowA
SetForegroundWindow
MapWindowPoints
GetMessagePos
GetMessageTime
GetWindowLongA
DestroyWindow
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetWindowTextA
GetDlgItem
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyA
GetUserNameA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
CreateProcessAsUserA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
UrlUnescapeA
PathIsUNCA
oleaut32
VariantChangeType
VariantClear
VariantInit
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
ws2_32
closesocket
gethostbyname
getpeername
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
Exports
Exports
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ