Static task
static1
Behavioral task
behavioral1
Sample
eba4707fd826fe0bfb45fb46d3027b93_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eba4707fd826fe0bfb45fb46d3027b93_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eba4707fd826fe0bfb45fb46d3027b93_JaffaCakes118
-
Size
251KB
-
MD5
eba4707fd826fe0bfb45fb46d3027b93
-
SHA1
11a2340e70c9108fd1f7d32ac64e630ebb2d6db3
-
SHA256
0dc9f704aa11c5686944f2227cfa5f26d1bb9371de06c53ed04a3226a9375865
-
SHA512
dcca305b79ef425a022bb5a30dab5481725331bf392b60a4873d1f843b608a739952c6469c7d5874d96280bcceb57bd689f56c540ce2a51643ad99df623d4285
-
SSDEEP
6144:xRcnW63w5HLUWyPTPcVH9AQfUjBdmrh7pX8tfoVjAf5b:xRcnWdVLUrr059AEUjngh7pXyoV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eba4707fd826fe0bfb45fb46d3027b93_JaffaCakes118
Files
-
eba4707fd826fe0bfb45fb46d3027b93_JaffaCakes118.dll windows:4 windows x86 arch:x86
671b6b4c79dcb58c53eaed08bbbdebc1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCommandLineA
GlobalUnlock
OutputDebugStringA
Thread32Next
TerminateThread
Thread32First
CreateToolhelp32Snapshot
GetThreadPriority
GetWindowsDirectoryA
GetCurrentProcessId
GetLocalTime
LoadLibraryA
GetCurrentThreadId
WritePrivateProfileStringA
GetSystemDirectoryA
SetFilePointer
CreateRemoteThread
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
DeleteFileA
Process32Next
WaitForSingleObject
Process32First
WriteFile
GetFileSize
GetFullPathNameA
CopyFileA
TerminateProcess
VirtualProtectEx
LockResource
LoadResource
SizeofResource
FindResourceA
SetThreadPriority
VirtualAlloc
VirtualFree
WideCharToMultiByte
MultiByteToWideChar
CreateFileA
ReadFile
ExitProcess
GetPrivateProfileIntA
GetPrivateProfileStringA
GetComputerNameA
GetCurrentProcess
GlobalSize
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CancelIo
InterlockedExchange
SetEvent
ResetEvent
lstrcpyA
lstrlenA
LocalAlloc
SetErrorMode
lstrcmpiA
lstrcatA
GetTickCount
RtlUnwind
GetStringTypeW
GetModuleFileNameA
GetStringTypeA
CreateThread
Sleep
OpenEventA
CreateEventA
CloseHandle
IsBadReadPtr
GlobalAlloc
GlobalLock
GetModuleHandleA
ReadProcessMemory
GetProcAddress
GlobalFree
FlushFileBuffers
user32
FindWindowA
GetWindowTextA
wsprintfA
GetClientRect
EnumChildWindows
GetAsyncKeyState
GetKeyState
GetKeyboardState
MapVirtualKeyA
ToAscii
GetDC
ReleaseDC
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetInputState
PostThreadMessageA
GetMessageA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetClassNameA
ToUnicode
ExitWindowsEx
BlockInput
keybd_event
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
SetRect
GetSystemMetrics
GetDesktopWindow
GetCursorPos
SendMessageA
GetForegroundWindow
ClientToScreen
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
gdi32
GetPixel
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetPaletteEntries
CreateHalftonePalette
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyA
OpenProcessToken
RegQueryValueExA
RegDeleteKeyA
msvcrt
??3@YAXPAX@Z
??1type_info@@UAE@XZ
free
calloc
_beginthreadex
__CxxFrameHandler
realloc
??2@YAPAXI@Z
strstr
_CxxThrowException
_ftol
memmove
ceil
ws2_32
connect
htons
gethostbyname
setsockopt
ntohs
WSAStartup
WSACleanup
send
select
closesocket
socket
recv
Sections
.text Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ