Static task
static1
Behavioral task
behavioral1
Sample
eb4b228e1b50a8c1b6ae7688968ab59b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb4b228e1b50a8c1b6ae7688968ab59b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eb4b228e1b50a8c1b6ae7688968ab59b_JaffaCakes118
-
Size
216KB
-
MD5
eb4b228e1b50a8c1b6ae7688968ab59b
-
SHA1
8fe756341e2330321994795af027dfa3d5193a1a
-
SHA256
1c4f2674bcd717fa20f203e3a01c304347c2ffc0a447a0c5bd9dfb6f7edb78a7
-
SHA512
59f3ad8c124f9e58001f41f3f1e2fcf50cd66d81f767e8d6015c6de74380d57fa8e53148ebc0e29991a6b6788fa21b427c6876104cd39e427049f87b7eabb86b
-
SSDEEP
3072:kVF0UKt+V/+twxV4OridDatGQ/xT2EbjcG6H+FQOpoO9JhXGoz98iaMqqDLy/+fz:CK+dFj4ORNJ6EaWbJp4iJqqDLuOb/oI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb4b228e1b50a8c1b6ae7688968ab59b_JaffaCakes118
Files
-
eb4b228e1b50a8c1b6ae7688968ab59b_JaffaCakes118.dll windows:4 windows x86 arch:x86
2379bb95f2dc3f7846e57ad4d5a92cb9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetStdHandle
SetHandleCount
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetEnvironmentVariableA
GetModuleFileNameA
ExitProcess
GetVersion
RtlUnwind
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
lstrcatA
IsBadReadPtr
IsBadCodePtr
HeapAlloc
HeapReAlloc
GetCPInfo
GetOEMCP
LCMapStringA
LCMapStringW
GetStringTypeA
VirtualAlloc
CreateThread
SetEvent
lstrcmpiA
GlobalGetAtomNameW
lstrcmpA
InterlockedCompareExchange
Sleep
LoadLibraryExW
FindResourceW
SizeofResource
MultiByteToWideChar
DisableThreadLibraryCalls
RaiseException
GetSystemDefaultLangID
FindResourceExW
LoadResource
LockResource
CloseHandle
InterlockedExchange
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GlobalUnlock
GlobalFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
DeleteAtom
WideCharToMultiByte
GetACP
lstrlenW
lstrcpyW
lstrcatW
AddAtomW
FindAtomA
lstrcpyA
AddAtomA
GlobalHandle
GetProcAddress
WritePrivateProfileStringW
lstrcmpiW
lstrlenA
GlobalLock
GlobalAlloc
GetModuleFileNameW
lstrcpynW
GlobalReAlloc
MulDiv
GetModuleHandleA
LocalAlloc
LocalFree
GetModuleHandleW
FreeLibrary
LoadLibraryA
IsBadWritePtr
GetStringTypeW
GetPrivateProfileStringW
LoadLibraryW
GetProfileStringW
VirtualProtect
GetVersionExA
GetCommandLineA
user32
BeginDeferWindowPos
LoadImageA
GetMenuState
RegisterClipboardFormatA
GetAsyncKeyState
CreateWindowExA
DrawMenuBar
MapWindowPoints
WinHelpA
LoadStringA
MessageBeep
DialogBoxParamA
GetWindowTextA
SetWindowLongA
CallWindowProcA
PostMessageA
LoadCursorA
RegisterClassA
DefWindowProcA
SetCapture
ReleaseCapture
LoadIconA
GetSubMenu
LoadAcceleratorsA
CopyAcceleratorTableA
IntersectRect
IsCharAlphaNumericA
IsCharAlphaA
GetDialogBaseUnits
CharPrevA
GetWindowThreadProcessId
GetWindowLongA
SendMessageA
MessageBoxA
EnableMenuItem
IsWindowVisible
BringWindowToTop
SetCursor
SetParent
IsWindow
ModifyMenuA
LoadMenuA
DispatchMessageA
DeferWindowPos
EndDeferWindowPos
RedrawWindow
IsWindowEnabled
SetWindowsHookA
GetMessageA
TranslateMessage
UnhookWindowsHook
FrameRect
EqualRect
GetDesktopWindow
DeleteMenu
InsertMenuA
GetMenuItemInfoA
SetMenuItemInfoA
SetMenu
SetForegroundWindow
FindWindowA
SystemParametersInfoA
GetNextDlgTabItem
SetWindowsHookExW
LoadAcceleratorsW
MessageBoxW
DestroyAcceleratorTable
SetFocus
SetWindowPlacement
GetWindowPlacement
GetFocus
GetDlgCtrlID
UnhookWindowsHookEx
DestroyWindow
CharLowerA
ReleaseDC
GetDC
SetWindowPos
AdjustWindowRect
GetWindowLongW
GetMenu
ScreenToClient
SendMessageW
wsprintfW
LoadStringW
GetClassInfoW
RegisterClassW
GetWindowRect
GetDlgItem
SetDlgItemTextW
GetScrollPos
GetClientRect
GetDlgItemInt
LoadCursorW
UpdateWindow
DefWindowProcW
CheckDlgButton
MoveWindow
CharUpperBuffA
SetWindowTextA
SetWindowLongW
SetScrollRange
ShowWindow
EndDialog
IsDlgButtonChecked
EnableWindow
SetScrollPos
SetDlgItemInt
InvalidateRect
DialogBoxParamW
GetSystemMetrics
GetActiveWindow
WindowFromDC
SystemParametersInfoW
SetPropW
CharUpperBuffW
CharLowerW
CharPrevW
CharNextW
OffsetRect
DrawTextW
SetRectEmpty
FillRect
RemovePropW
SetTimer
KillTimer
BeginPaint
IsIconic
EndPaint
DestroyIcon
DefMDIChildProcW
ClientToScreen
TrackPopupMenu
PeekMessageW
PtInRect
GetKeyState
wvsprintfW
PostMessageW
IsRectEmpty
SetRect
GetParent
SetWindowTextW
SetActiveWindow
wsprintfA
GetSysColor
InflateRect
DrawIcon
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
RegisterClipboardFormatW
CreateWindowExW
CheckMenuItem
CreatePopupMenu
AppendMenuW
DestroyMenu
TranslateAcceleratorA
advapi32
FreeSid
RegCreateKeyW
RegEnumValueW
RegCreateKeyExW
RegOpenKeyExW
AllocateAndInitializeSid
CheckTokenMembership
RegCreateKeyA
RegSetValueExW
RegDeleteValueW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
OpenProcessToken
GetTokenInformation
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExA
RegOpenKeyA
gdi32
SetROP2
RestoreDC
CreateMetaFileW
SetWindowOrgEx
SetWindowExtEx
CloseMetaFile
DeleteMetaFile
GetTextExtentPointW
ExcludeClipRect
CreatePatternBrush
CreateFontIndirectW
CreateSolidBrush
GetDIBits
SetDIBits
GetNearestColor
GetBitmapBits
PatBlt
GetPixel
SetBkColor
ExtTextOutW
Escape
GetClipBox
SetBitmapBits
StretchBlt
SetDIBitsToDevice
StretchDIBits
GdiFlush
SetStretchBltMode
RealizePalette
GetStockObject
SelectPalette
CreateCompatibleDC
CreateCompatibleBitmap
CreateDIBSection
GetSystemPaletteEntries
ResizePalette
SetPaletteEntries
AnimatePalette
SetDIBColorTable
GetNearestPaletteIndex
GetObjectW
GetPaletteEntries
CreatePalette
DeleteObject
SelectObject
DeleteDC
LPtoDP
GetDCOrgEx
GetDeviceCaps
EnumFontFamiliesExW
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
SetBkMode
Rectangle
GetBkMode
GetROP2
CreatePen
SaveDC
ole32
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CLSIDFromString
CoUninitialize
CoInitializeEx
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ