___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
e20fc049858efd87e8baa2ad8c7486a9_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e20fc049858efd87e8baa2ad8c7486a9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e20fc049858efd87e8baa2ad8c7486a9_JaffaCakes118
-
Size
111KB
-
MD5
e20fc049858efd87e8baa2ad8c7486a9
-
SHA1
cc8a3a408dc8d1dfb9aa1aaa9ac69f6e5658fdbe
-
SHA256
20381e749bc3f129ef252f87f47d66b8f6bb245d864c46ade5b86b7581504301
-
SHA512
ab17f511bcdc01b78da0cef4e0293feb09fad8dc8a6b237e1023fca9db8ee3c102dd6538551348d17241aa60b0487da87dba7198bf46c9b97cbef51b0d4ed8f7
-
SSDEEP
3072:74zym5DXG2D0Ww88BRApF8RBPFhgmidqjCM89/DuX3aKR:kRq2D0l88BRw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e20fc049858efd87e8baa2ad8c7486a9_JaffaCakes118
Files
-
e20fc049858efd87e8baa2ad8c7486a9_JaffaCakes118.dll windows:4 windows x86 arch:x86
4acfba0a8a4ba9255fe31ec541fcfcf9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
kernel32
CloseHandle
CreateFileA
DeleteCriticalSection
EnterCriticalSection
EnumCalendarInfoA
ExitProcess
FindClose
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDiskFreeSpaceA
GetEnvironmentStrings
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetThreadLocale
GetVersion
GetVersionExA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetEndOfFile
SetFilePointer
SetHandleCount
SetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcpyA
lstrcpynA
lstrlenA
user32
CharNextA
EnumThreadWindows
GetKeyboardType
GetSystemMetrics
LoadStringA
MessageBoxA
wsprintfA
oleaut32
SysAllocStringLen
SysFreeString
SysStringLen
VariantChangeTypeEx
VariantClear
VariantCopyInd
Exports
Exports
Sections
.text Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ