ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
ea256a52212c1dc3b86109d12961a52c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea256a52212c1dc3b86109d12961a52c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea256a52212c1dc3b86109d12961a52c_JaffaCakes118
-
Size
26KB
-
MD5
ea256a52212c1dc3b86109d12961a52c
-
SHA1
e2e70601690890ad8086791d7696235fac01cc26
-
SHA256
4523d35bdeedde1529b4e968830217db4a66bf4ebba2cebdfd0ce80d327c7e64
-
SHA512
6755e03c514f2331a2ce48509489f1d0183525f50b207ed2198022e2202b2b658572a01a8e34b3c9ee64bd212f8e313acfa8a84922bba778eb6abbc0cf0d2f4b
-
SSDEEP
384:hQsNVJd8NlEwILqe3ilR47bk/t94mZqSg3m49zpP5GjCafdvuDI/4Jo8YFGqP5v4:lNHyxeF57AFvZbiylfdGDIaYFp5vciq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea256a52212c1dc3b86109d12961a52c_JaffaCakes118
Files
-
ea256a52212c1dc3b86109d12961a52c_JaffaCakes118.dll windows:4 windows x86 arch:x86
6b9768e35dd7c73fc7d970d1c4ab749f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
MoveFileExA
FreeLibraryAndExitThread
DeleteFileA
CreateDirectoryA
CopyFileA
LockResource
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
GetTickCount
Process32First
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
CreateEventA
DuplicateHandle
LoadLibraryExA
GetModuleHandleA
GlobalMemoryStatusEx
GetVersionExA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
CreateThread
GetModuleFileNameA
GetLongPathNameA
lstrcmpiA
OutputDebugStringA
WriteFile
GetTempPathA
CreateFileA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
GetLocalTime
GetStartupInfoA
ExpandEnvironmentStringsA
CreateProcessA
Sleep
CreateToolhelp32Snapshot
Thread32First
Thread32Next
WaitForSingleObject
TerminateProcess
Process32Next
CloseHandle
user32
wsprintfW
wsprintfA
EnumThreadWindows
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
OpenDesktopA
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
GetClassNameA
MoveWindow
FindWindowExA
PostMessageA
advapi32
RegCloseKey
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
RegQueryValueExA
QueryServiceStatus
StartServiceA
RegSetValueExA
RegCreateKeyExA
CreateServiceA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerW
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegOpenKeyExA
ws2_32
gethostbyname
inet_addr
WSAStartup
setsockopt
getsockopt
closesocket
connect
htons
socket
send
gethostname
recv
ntdll
RtlInitUnicodeString
_strcmpi
RtlEqualUnicodeString
NtQueryObject
NtQuerySystemInformation
wtsapi32
WTSEnumerateSessionsA
Exports
Exports
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
MySec Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ