Static task
static1
Behavioral task
behavioral1
Sample
dfe78ed6bea7b34a0b0f2700a55f5fd4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfe78ed6bea7b34a0b0f2700a55f5fd4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dfe78ed6bea7b34a0b0f2700a55f5fd4_JaffaCakes118
-
Size
149KB
-
MD5
dfe78ed6bea7b34a0b0f2700a55f5fd4
-
SHA1
4c0eda319098cd9b54c3a8ef3635ee0f059a0a47
-
SHA256
ada3ab090d173b9aba284b756cb3d548be600cb7e9970fe78426a00e1218d5fa
-
SHA512
80932f66110f526881fd294a6ab9d9d379c6dc11f4f92f4996902e5bb3cfa27b508b8cb1418e30bd4f109f8116420d925e20f312adef95a7ca3b7e99011b754a
-
SSDEEP
3072:uEcIBWsgem+no6ieuA9JFcao9MFHRhFAKQqFvtbs+vcN:uEcIBWsgeo6idKFcrmLOKJvtVcN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfe78ed6bea7b34a0b0f2700a55f5fd4_JaffaCakes118
Files
-
dfe78ed6bea7b34a0b0f2700a55f5fd4_JaffaCakes118.dll windows:4 windows x86 arch:x86
e859de04770322e0307504de251e9dca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcess
GetComputerNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
Sleep
SetThreadContext
GetThreadContext
GetCurrentThread
SetUnhandledExceptionFilter
ExitProcess
CloseHandle
ReadFile
CreateFileA
GetCommandLineA
GlobalUnlock
OutputDebugStringA
CreateEventA
OpenEventA
TerminateThread
GetProcAddress
GetCurrentProcessId
TerminateProcess
OpenProcess
CreateThread
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
DeleteFileA
WriteFile
GetFileSize
VirtualProtectEx
SetThreadPriority
VirtualAlloc
VirtualFree
WideCharToMultiByte
MultiByteToWideChar
Process32Next
Process32First
CreateToolhelp32Snapshot
Thread32Next
Thread32First
GetThreadPriority
GetWindowsDirectoryA
GetStringTypeW
GetStringTypeA
IsBadReadPtr
GlobalAlloc
GlobalLock
GetModuleHandleA
ReadProcessMemory
GlobalFree
GetCurrentThreadId
GetModuleFileNameA
RtlUnwind
user32
EnumChildWindows
GetClassNameA
IsWindowVisible
ReleaseDC
GetDC
ClientToScreen
GetClientRect
ToAscii
MapVirtualKeyA
GetKeyboardState
GetKeyState
GetForegroundWindow
IsWindowEnabled
GetAsyncKeyState
ToUnicode
wsprintfA
GetWindowTextA
FindWindowA
GetWindowThreadProcessId
GetMessageA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetInputState
PostThreadMessageA
SendMessageA
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
gdi32
GetPixel
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ