Static task
static1
Behavioral task
behavioral1
Sample
eeac4a573ae352af357a397abaa0dd22_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eeac4a573ae352af357a397abaa0dd22_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eeac4a573ae352af357a397abaa0dd22_JaffaCakes118
-
Size
108KB
-
MD5
eeac4a573ae352af357a397abaa0dd22
-
SHA1
3ee6ae79398d3301d12d5f85eb0b78b5ff959f87
-
SHA256
318d9daf515e4ba5e78c5d1039c23865781153c9f4ef0ccede9216f13659eb48
-
SHA512
4e8bebe778470a90e25da9f0e2561db7305a424d24a688203c603f2b01699cecbc4814464f1562060f24fd558724a65bc83f13f4045a7dc4bbfa46a1df43911c
-
SSDEEP
1536:Fa/i+ez2qg1+Vmzd+10MirrdavaA+C4jweuA3jNFJgi/gUTOkJF:8/2aqgj++dMaH1w8zNFJVgqzF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eeac4a573ae352af357a397abaa0dd22_JaffaCakes118
Files
-
eeac4a573ae352af357a397abaa0dd22_JaffaCakes118.dll windows:4 windows x86 arch:x86
86962700d34d7f05087a2f455db69e8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
winmm
PlaySoundW
waveOutRestart
waveOutUnprepareHeader
midiOutSetVolume
midiInStart
mmioInstallIOProcA
dinput
DirectInputCreateW
ole32
PropVariantClear
IsEqualGUID
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
user32
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClassA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
GetTopWindow
GetKeyState
SetSystemCursor
GetCaretPos
EnumPropsA
EmptyClipboard
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CharToOemA
CharLowerBuffA
BeginDeferWindowPos
ShowWindow
UpdateWindow
GetForegroundWindow
ws2_32
WSAUnhookBlockingHook
WSCDeinstallProvider
closesocket
connect
gethostbyname
htons
socket
WSAGetLastError
kernel32
MulDiv
HeapCreate
HeapAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetTimeZoneInformation
ReadFile
GetSystemInfo
GetSystemDefaultLangID
GetStringTypeExA
GetPrivateProfileSectionW
OpenEventW
GetFileAttributesExA
GetCurrentProcessId
GetConsoleOutputCP
GetConsoleAliasA
GetCommandLineA
GetBinaryTypeA
FormatMessageA
FlushConsoleInputBuffer
FindNextVolumeW
FindAtomW
SetEnvironmentVariableA
SetFileTime
GetModuleHandleA
OpenJobObjectW
TlsGetValue
DuplicateHandle
WaitForMultipleObjectsEx
lstrcmpA
GetTempPathW
Beep
BindIoCompletionCallback
CloseHandle
CreateSemaphoreA
DeleteCriticalSection
FindAtomA
EnumTimeFormatsA
ExitProcess
advapi32
GetAclInformation
FileEncryptionStatusA
GetAce
GetSecurityDescriptorDacl
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
I_ScSetServiceBitsA
LookupPrivilegeNameW
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaRemoveAccountRights
LsaSetInformationTrustedDomain
AddAccessDeniedAce
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ