smiGLmm
Static task
static1
Behavioral task
behavioral1
Sample
e16c409346eeb29c13c4e030c3f71f78_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e16c409346eeb29c13c4e030c3f71f78_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e16c409346eeb29c13c4e030c3f71f78_JaffaCakes118
-
Size
160KB
-
MD5
e16c409346eeb29c13c4e030c3f71f78
-
SHA1
8eda788225c7a1ade9a1e3f78d4e96be200e8ba8
-
SHA256
257143f9e6131bc7a2c44d2ce2847d3b3d312cac566e8fe1c5ee3e3dc306eefb
-
SHA512
f6ebf08ce6bc34458e53275c74c9ac34f4567648743570bc0f77436f5a95376dc7f5a4c9776c9a2c4648d67a48245196ca978f6ab0fec2ef0e4d4ad6161468e2
-
SSDEEP
3072:rLhsOufj4tc3Yrdq3O4h/U8CTtj2WWO9kKhEG59rYFHUjMYFasEEUWxc:rLoMtc3YQ7h9cF2WWOJeBF0AYbvx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e16c409346eeb29c13c4e030c3f71f78_JaffaCakes118
Files
-
e16c409346eeb29c13c4e030c3f71f78_JaffaCakes118.dll windows:4 windows x86 arch:x86
11f959c51a542c5f7249cc6c88fb55b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WriteFile
CreateFileA
LoadLibraryA
WriteProcessMemory
CreateMutexW
CreateEventA
GetModuleFileNameA
HeapAlloc
GetProcAddress
HeapFree
CreateDirectoryA
CopyFileA
CreateFileMappingA
CloseHandle
LocalFree
OpenEventA
CreateProcessA
GetComputerNameA
EnterCriticalSection
Sleep
GetVolumeInformationA
MapViewOfFile
InterlockedCompareExchange
ReadProcessMemory
GetLastError
ExitProcess
GetTickCount
GlobalAlloc
OpenFileMappingA
SetLastError
GetProcessHeap
TerminateProcess
GetCurrentProcess
InterlockedDecrement
GlobalFree
UnmapViewOfFile
GetCommandLineA
GetModuleHandleA
InterlockedIncrement
LeaveCriticalSection
WaitForSingleObject
ole32
OleSetContainedObject
CoInitialize
CoTaskMemAlloc
CoUninitialize
CoCreateGuid
CoSetProxyBlanket
OleCreate
CoCreateInstance
user32
GetSystemMetrics
KillTimer
PostQuitMessage
ScreenToClient
SetWindowLongA
GetWindowLongA
SetWindowsHookExA
RegisterWindowMessageA
DefWindowProcA
FindWindowA
DestroyWindow
GetWindow
TranslateMessage
SetTimer
SendMessageA
GetClassNameA
GetCursorPos
CreateWindowExA
GetMessageA
DispatchMessageA
GetParent
ClientToScreen
GetWindowThreadProcessId
PeekMessageA
UnhookWindowsHookEx
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocString
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegCloseKey
RegOpenKeyExA
GetUserNameA
RegSetValueExA
SetTokenInformation
OpenProcessToken
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
DuplicateTokenEx
RegDeleteValueA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iuenf Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ