Static task
static1
Behavioral task
behavioral1
Sample
f53c17f0738fa46901e85fd4f59d7083_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f53c17f0738fa46901e85fd4f59d7083_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f53c17f0738fa46901e85fd4f59d7083_JaffaCakes118
-
Size
96KB
-
MD5
f53c17f0738fa46901e85fd4f59d7083
-
SHA1
3c19d8393f6ebc625afe37861806fa1cbce49d30
-
SHA256
195e5145ed75346a9f6ccbf22ce9bffc430fc2a803dda2e974a958d1e4731ce0
-
SHA512
2b75aea2466b87e8872c999b23559771ed48869a1a2cc76128b06c810b83f2c3419c94f6818b2c03e897b00d5e3bd300861deb1526871948995ffeaa70e12c1c
-
SSDEEP
1536:BLiosLB7q0a93vNDN8fdO/YFNs7z+295gcItv6txf4jiVmiEQ1UMsXKukPi+psI1:BGos97q0Yt6+lrxQjiAilUMsXKukPi+n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f53c17f0738fa46901e85fd4f59d7083_JaffaCakes118
Files
-
f53c17f0738fa46901e85fd4f59d7083_JaffaCakes118.dll windows:4 windows x86 arch:x86
6786fd7affe9f179fd76308a5d6593a7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
lstrcmpiA
lstrcatA
lstrcmpA
WinExec
lstrlenA
GlobalAddAtomA
GlobalGetAtomNameA
GlobalFindAtomA
GetProcAddress
LocalLock
LocalUnlock
LocalFree
GlobalSize
GlobalDeleteAtom
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LoadLibraryA
GetDriveTypeA
OpenFile
CloseHandle
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetLocaleInfoW
VirtualProtect
LocalAlloc
GetCommandLineA
user32
IsWindow
GetClipboardData
EnumClipboardFormats
PeekMessageA
GetWindowThreadProcessId
IsClipboardFormatAvailable
RegisterClipboardFormatA
PackDDElParam
GetWindowLongA
DefWindowProcA
CreateWindowExA
SetWindowLongA
SendMessageA
KillTimer
LoadCursorW
RegisterClassW
CreateWindowExW
GetWindowLongW
SetWindowLongW
SendMessageW
DestroyIcon
DestroyWindow
PostMessageA
advapi32
OpenProcessToken
RegOpenKeyExA
RegQueryValueA
RegCloseKey
gdi32
GetEnhMetaFileHeader
SetEnhMetaFileBits
CopyEnhMetaFileA
GetDeviceCaps
StretchDIBits
RealizePalette
GetEnhMetaFileBits
DeleteEnhMetaFile
DeleteObject
GetObjectA
SelectPalette
GetStockObject
DeleteMetaFile
CreatePalette
GetBitmapBits
msvcrt
_cexit
_wcmdln
_initterm
_amsg_exit
exit
free
malloc
_adjust_fdiv
_except_handler3
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ