Static task
static1
Behavioral task
behavioral1
Sample
ef04c506d7419b944e34d7f5f764683d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef04c506d7419b944e34d7f5f764683d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ef04c506d7419b944e34d7f5f764683d_JaffaCakes118
-
Size
65KB
-
MD5
ef04c506d7419b944e34d7f5f764683d
-
SHA1
00f9a132bc1df50fb9a00f4efc83e767c4f900e8
-
SHA256
f5d72887bb991789a71688f44e176b6a96f16cbbfa2641ff623065b8aa3e3560
-
SHA512
67703387fb936e73d00b54472e5d9bb86912b13c83d1b63cb23eccbe4f40f9ef157818956d629abb789c3320d123a7e36d87ff7deab973ea3d7ec6746e932035
-
SSDEEP
1536:GllDccJ29CSh8myLWALB5jNIEfqJynfNoS4W7s8ubkCQeqMARGF:C2c88mQWy3vqyfNVCFF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef04c506d7419b944e34d7f5f764683d_JaffaCakes118
Files
-
ef04c506d7419b944e34d7f5f764683d_JaffaCakes118.dll windows:4 windows x86 arch:x86
bb8dac29cdda5ac9af46bd7baef9121b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeResource
GetCurrentProcessId
GetFileTime
GetProcAddress
GetSystemTimeAsFileTime
HeapAlloc
HeapCreate
MulDiv
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
UnlockFile
lstrcatA
lstrcpynA
lstrlenA
user32
CallWindowProcA
DestroyMenu
DestroyWindow
GetWindowRect
IsDialogMessageA
IsWindow
IsWindowEnabled
IsWindowVisible
PostMessageA
PtInRect
RegisterClipboardFormatA
SetWindowPos
ValidateRect
Sections
CODE Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ