Static task
static1
Behavioral task
behavioral1
Sample
f09e2dcb43051868be3ea4a69b6c7bc1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f09e2dcb43051868be3ea4a69b6c7bc1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f09e2dcb43051868be3ea4a69b6c7bc1_JaffaCakes118
-
Size
180KB
-
MD5
f09e2dcb43051868be3ea4a69b6c7bc1
-
SHA1
64c7d8f309a72089654bfb387e8c262ff8a22e44
-
SHA256
0e98b123a994651d4cbc906da9de32c0c8c8ad3e826a0f0c7d610650f11d4f82
-
SHA512
7c24f7992aa18fae477a2c254ba8df9e47ffd962037e09e2b9eddd5ee8cf24792dc25c38374fe89628635b575d366c0f65b2f11dfdd303f5000f5360b7998236
-
SSDEEP
3072:TFnm3+GvvGBeQYejpXIAq2tn2TBfki43y97FozS4Oq1sqH73oGC:ZKvkwejpBqun2TB8i4i0zLOosqHkG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f09e2dcb43051868be3ea4a69b6c7bc1_JaffaCakes118
Files
-
f09e2dcb43051868be3ea4a69b6c7bc1_JaffaCakes118.dll windows:4 windows x86 arch:x86
1f5e76572fad36553733428ca3571f53
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
htonl
kernel32
FindClose
FindFirstFileA
GetVolumeInformationA
WaitForSingleObject
CreateMutexA
OpenMutexA
ReadFile
FindNextFileA
FreeLibrary
GetTempPathA
GetSystemDirectoryA
GetSystemTime
lstrlenA
lstrcpynA
GetComputerNameA
OpenProcess
GetVersionExA
GetModuleFileNameA
LocalFree
LocalAlloc
GetCurrentProcess
GetCurrentThread
CreateMutexW
SetLastError
lstrcpyA
GetVersion
lstrcatA
VirtualFree
ReleaseMutex
VirtualAlloc
OpenMutexW
GetModuleHandleA
LoadLibraryExA
IsBadReadPtr
CreateFileW
GetEnvironmentVariableW
LoadLibraryW
MapViewOfFile
CreateFileMappingA
LoadLibraryA
SetFilePointer
GetProcAddress
CreateThread
Sleep
CreateFileA
WriteFile
CloseHandle
GetFileTime
SetFileTime
CreateProcessA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
FindResourceA
LoadResource
SizeofResource
LockResource
DeleteFileA
GetLastError
CopyFileA
SetFileAttributesA
GetEnvironmentVariableA
GetCurrentProcessId
GetFileSize
user32
UnregisterClassA
SetPropA
CreateWindowExW
DestroyWindow
wsprintfA
UnregisterClassW
advapi32
RegDeleteValueA
RegEnumValueA
LookupAccountNameA
RegEnumKeyExA
LookupAccountSidA
IsValidSid
AccessCheck
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetUserNameW
LookupAccountSidW
AllocateAndInitializeSid
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
DuplicateTokenEx
OpenThreadToken
GetSidIdentifierAuthority
SetSecurityDescriptorDacl
msvcrt
_mbschr
_local_unwind2
strcmp
wcsncat
wcscpy
strncmp
_wcsicmp
_adjust_fdiv
_itoa
_stricmp
sscanf
strcat
memset
strstr
strncpy
memcpy
strlen
malloc
strcpy
free
strncat
memcmp
_snprintf
_ftol
realloc
_abnormal_termination
wcscmp
wcslen
??3@YAXPAX@Z
??2@YAPAXI@Z
_initterm
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ