Static task
static1
Behavioral task
behavioral1
Sample
e17bacfb0f7956c4d3faedc2a21dad69_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e17bacfb0f7956c4d3faedc2a21dad69_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e17bacfb0f7956c4d3faedc2a21dad69_JaffaCakes118
-
Size
25KB
-
MD5
e17bacfb0f7956c4d3faedc2a21dad69
-
SHA1
a496409c1255b5e3193df4ddfd1a8f443acaf2f8
-
SHA256
2e25d457962f066f863ad3fb930ee782c5f2aa8d74ec5841499c6b51a30f1e68
-
SHA512
32047504576dcf09c216a507d43d9b24070ff6dabc57c79892d9d3e3b89f02e6bcd8de3e4e12be33329e2bdde7041428140746e8a7b1488d60619b8fe09f3e65
-
SSDEEP
192:bCTrJp4kWZpC+KcQBmxmYG/JRqGlGO2Po+WtUFhvGPd7cWQtqrYzI1wlDwZw6O4U:bCTrJp4LZpCyGVG5qce17cWQtQaTKE7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e17bacfb0f7956c4d3faedc2a21dad69_JaffaCakes118
Files
-
e17bacfb0f7956c4d3faedc2a21dad69_JaffaCakes118.dll windows:4 windows x86 arch:x86
c2c3c212c4d06dd95bb429ca4b69b809
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
IsTextUnicode
RegCloseKey
RegCreateKeyW
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CompareStringW
CreateFileMappingW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FoldStringW
FormatMessageW
GetACP
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileAttributesW
GetFileInformationByHandle
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetUserDefaultUILanguage
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LocalAlloc
LocalFree
LocalLock
LocalReAlloc
LocalSize
LocalUnlock
MapViewOfFile
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
user32
CharLowerW
CharNextW
CharUpperW
CheckMenuItem
ChildWindowFromPoint
CloseClipboard
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawTextExW
EnableMenuItem
EnableWindow
EndDialog
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetDlgItemTextW
GetFocus
GetForegroundWindow
GetKeyboardLayout
GetMenu
GetMenuState
GetMessageW
GetParent
GetSubMenu
GetSystemMenu
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowTextW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
IsIconic
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBeep
MessageBoxW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterWindowMessageW
ReleaseDC
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCursor
SetDlgItemTextW
SetFocus
SetScrollPos
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnhookWinEvent
UpdateWindow
WinHelpW
wsprintfW
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ