Static task
static1
Behavioral task
behavioral1
Sample
f0bc76030e34fec05d40a68321743d09_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0bc76030e34fec05d40a68321743d09_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f0bc76030e34fec05d40a68321743d09_JaffaCakes118
-
Size
108KB
-
MD5
f0bc76030e34fec05d40a68321743d09
-
SHA1
5bf0af2128d42fbc5a8e6e1bc0955e056f339a36
-
SHA256
56f75450198eb652a119db2dabe0c9a64c807246a709086275e282d8db6005d9
-
SHA512
4fe11735f1289b63bfeb9e32815aaa0eee8d0788c1a339b93e785670ae4b3b3b8cb59b05b9d023b81830637760d1bd58d9ec55bb8f73be8d0b626d30f762cf07
-
SSDEEP
1536:PbOj9xtk32hxolQuN0b2TNtXyYktdFlbwhGofKbQ1IO6nToIfuiQUg87e8:TOj9xtnMQa0bSYLEGYB/WTBfubR87e8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0bc76030e34fec05d40a68321743d09_JaffaCakes118
Files
-
f0bc76030e34fec05d40a68321743d09_JaffaCakes118.dll windows:4 windows x86 arch:x86
1d612253d254237a22850dc2e53922bb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LocalFree
LocalAlloc
GetCurrentProcess
GetVersionExA
FreeLibrary
FindFirstVolumeA
GetComputerNameA
GlobalMemoryStatus
ExitProcess
GetVolumeInformationA
FindVolumeClose
ExpandEnvironmentStringsA
Module32Next
GetProcAddress
ResetEvent
MoveFileExA
lstrlenA
RemoveDirectoryA
GetLastError
GetFileAttributesExA
SetErrorMode
GetDriveTypeA
GetDiskFreeSpaceExA
CreateDirectoryA
CreateFileA
FindFirstFileA
FindNextFileA
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualAllocEx
VirtualFreeEx
TerminateProcess
OpenProcess
Toolhelp32ReadProcessMemory
GetCurrentThreadId
lstrcpyA
LoadLibraryA
GetTickCount
FindClose
SetFileAttributesA
MoveFileA
GetFileAttributesA
CloseHandle
QueryPerformanceFrequency
QueryPerformanceCounter
PeekNamedPipe
ReadFile
WriteFile
SetEvent
CreateEventA
WaitForSingleObject
DeleteFileA
Sleep
CopyFileA
CreatePipe
GetSystemDirectoryA
GetStartupInfoA
CreateProcessA
GetWindowsDirectoryA
user32
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseWindowStation
ReleaseDC
OpenInputDesktop
SetCursorPos
mouse_event
keybd_event
wsprintfA
ExitWindowsEx
GetUserObjectInformationA
SetThreadDesktop
OpenDesktopA
CloseDesktop
GetDC
gdi32
SelectPalette
RealizePalette
GetDIBits
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
CreateDCA
GetDeviceCaps
DeleteDC
GetStockObject
advapi32
CryptHashData
RegSaveKeyA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
GetTokenInformation
LookupAccountSidA
CryptAcquireContextA
CryptCreateHash
CryptDeriveKey
CryptDestroyHash
CryptDecrypt
CryptEncrypt
CloseServiceHandle
QueryServiceConfig2A
QueryServiceConfigA
OpenServiceA
EnumServicesStatusExA
ChangeServiceConfigA
UnlockServiceDatabase
LockServiceDatabase
ChangeServiceConfig2A
ControlService
QueryServiceStatus
StartServiceA
DeleteService
AdjustTokenPrivileges
LookupPrivilegeValueA
GetUserNameA
RevertToSelf
OpenSCManagerA
msvcrt
strstr
_adjust_fdiv
_initterm
fputc
_errno
_fdopen
fprintf
ftell
ceil
_vsnprintf
memcmp
??3@YAXPAX@Z
strlen
strcpy
_mbsnbcat
fclose
fwrite
fseek
fread
fopen
_beginthreadex
free
strncmp
memset
malloc
__CxxFrameHandler
_except_handler3
memcpy
strcat
_mbscmp
strcmp
_itoa
_ftol
atoi
_wcsnicmp
sprintf
strncpy
??2@YAPAXI@Z
netapi32
Netbios
wininet
InternetConnectA
InternetOpenA
InternetReadFile
InternetWriteFile
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestExA
HttpSendRequestA
InternetSetOptionA
ws2_32
inet_ntoa
gethostbyname
inet_addr
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ