advcfgusb
Static task
static1
Behavioral task
behavioral1
Sample
ef253d410d35eb6c1e4eac6e5f03d99a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef253d410d35eb6c1e4eac6e5f03d99a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ef253d410d35eb6c1e4eac6e5f03d99a_JaffaCakes118
-
Size
148KB
-
MD5
ef253d410d35eb6c1e4eac6e5f03d99a
-
SHA1
ed774defcf90f675f5da684a78e4548610f2c01e
-
SHA256
346e2a5130a9ed47d6425667a131199b1c81b494ec203b3f0b5a5ce643c3058d
-
SHA512
51e434e06cb18ac0d0afb88d332d92260382d083167a0d037ac7c460ea22b7c5f876eb371104c91af3e4e767222ed5135c6610e99ea5be7c9fd8959ee6b84151
-
SSDEEP
3072:x7tZG55CE5Z2JzKMDHzwgoonvPeZtl/UG:/AnCEawsMnCCtxUG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef253d410d35eb6c1e4eac6e5f03d99a_JaffaCakes118
Files
-
ef253d410d35eb6c1e4eac6e5f03d99a_JaffaCakes118.dll windows:4 windows x86 arch:x86
fc5dcaaa425429f0b58007d6fd65a7db
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
InterlockedDecrement
GetModuleFileNameA
GetTickCount
CreateDirectoryA
GetCommandLineA
GlobalAlloc
InterlockedIncrement
GetProcessHeap
Sleep
GetLastError
TerminateProcess
GetProcAddress
CloseHandle
SetLastError
GlobalFree
HeapAlloc
CreateFileA
CreateFileMappingA
GetComputerNameA
GetCurrentProcess
OpenFileMappingA
HeapFree
CreateMutexW
LeaveCriticalSection
InterlockedCompareExchange
WriteFile
LocalFree
GetVolumeInformationA
GetModuleHandleA
LoadLibraryA
CreateEventA
CreateProcessA
EnterCriticalSection
ReadProcessMemory
MapViewOfFile
WriteProcessMemory
OpenEventA
CopyFileA
ExitProcess
UnmapViewOfFile
WaitForSingleObject
ole32
CoSetProxyBlanket
CoUninitialize
CoCreateGuid
OleCreate
CoTaskMemAlloc
CoCreateInstance
OleSetContainedObject
CoInitialize
user32
GetParent
PeekMessageA
GetMessageA
SetWindowLongA
GetWindowThreadProcessId
UnhookWindowsHookEx
SendMessageA
CreateWindowExA
GetCursorPos
DestroyWindow
TranslateMessage
DefWindowProcA
GetSystemMetrics
SetWindowsHookExA
FindWindowA
ClientToScreen
GetClassNameA
ScreenToClient
DispatchMessageA
KillTimer
SetTimer
RegisterWindowMessageA
PostQuitMessage
GetWindowLongA
GetWindow
oleaut32
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
shlwapi
StrStrIW
UrlUnescapeW
advapi32
RegCreateKeyExA
RegQueryValueExA
OpenProcessToken
GetUserNameA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
DuplicateTokenEx
SetTokenInformation
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ