Static task
static1
Behavioral task
behavioral1
Sample
ea6de16c0c349e10d0b8ef80c838fe1d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea6de16c0c349e10d0b8ef80c838fe1d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea6de16c0c349e10d0b8ef80c838fe1d_JaffaCakes118
-
Size
137KB
-
MD5
ea6de16c0c349e10d0b8ef80c838fe1d
-
SHA1
dd2f326145d56a1ef8073a5749843cfd74a4cab2
-
SHA256
53e24a1c920472c7bd68b13180f2b6de7d5d2b4b86378a879c7d1ed7c1825f10
-
SHA512
119ee1a4810b8811b18ef0c3e596d9c084bbb830ba7bf48f74e75ca62aa23d61244c58ae3af68b36d5af3ba3d6d9ccae9c4121465ef7ad53f61b7caa389d8c7e
-
SSDEEP
3072:MWp36jFpsIuo3c1OK+yBaMm31obl4vZwgmvchZ7lWz90+4WS:MWpKjzuo3vMpblFOMzu3F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea6de16c0c349e10d0b8ef80c838fe1d_JaffaCakes118
Files
-
ea6de16c0c349e10d0b8ef80c838fe1d_JaffaCakes118.dll windows:4 windows x86 arch:x86
89d85a9687e0ccde37876e3fdf0d2041
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
lstrlenW
lstrlenA
MultiByteToWideChar
GetModuleFileNameA
GetVolumeInformationA
CloseHandle
WriteFile
CreateFileA
GetTickCount
Sleep
MoveFileA
DeleteFileA
ReadFile
GetFileSize
CopyFileA
CreateThread
CreateMutexA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetTempPathA
InterlockedExchange
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
GetStringTypeW
GetStringTypeA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
GetStartupInfoA
GetFileType
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
LCMapStringA
LCMapStringW
GetOEMCP
GetCPInfo
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
HeapCreate
VirtualFree
IsBadWritePtr
TerminateProcess
GetCurrentProcess
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
VariantClear
SysAllocStringLen
VariantInit
shlwapi
PathFileExistsA
wininet
InternetCloseHandle
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ