Static task
static1
Behavioral task
behavioral1
Sample
f5524d7d5a87050aaaa394806c0acbe9_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5524d7d5a87050aaaa394806c0acbe9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f5524d7d5a87050aaaa394806c0acbe9_JaffaCakes118
-
Size
31KB
-
MD5
f5524d7d5a87050aaaa394806c0acbe9
-
SHA1
6d00a3b583b839f9302465467b4eadfccd91e42b
-
SHA256
7ede33aa6171ad6424151bdd57353ee62699bfefd1c4f6ef6babcf018aab65ab
-
SHA512
142421596fe90def947783478c0fa75461877011641be216af98fde2a71bdc1c7c5febd2cf5daa41b229b2a01afaec7ae4e7ec64c955b972d870eaf54a3fdd17
-
SSDEEP
384:n+8n++B+XaHaGEsRmY291ZbX7TnXMHpct5mAMN0uE:+8n++PcsRm79TbX7TnXKat5mXNZE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5524d7d5a87050aaaa394806c0acbe9_JaffaCakes118
Files
-
f5524d7d5a87050aaaa394806c0acbe9_JaffaCakes118.dll windows:4 windows x86 arch:x86
2c2ac732a4767441b0d19fb69c3e8965
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ToAscii
GetWindowTextA
EnableWindow
FindWindowA
FindWindowExA
EnumChildWindows
msvcrt
_adjust_fdiv
_itoa
_initterm
free
srand
memcmp
strrchr
atoi
rand
strchr
strcmp
strcpy
strstr
fopen
fwrite
fclose
fread
time
??2@YAPAXI@Z
memset
memcpy
??3@YAXPAX@Z
_strlwr
malloc
kernel32
DeleteFileA
CreateThread
ExitProcess
GetTickCount
GetModuleHandleA
InitializeCriticalSection
GetTempPathA
EnterCriticalSection
lstrlenA
LeaveCriticalSection
lstrcpyA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
VirtualAllocEx
GlobalAlloc
GlobalLock
ReadProcessMemory
lstrcatA
GetCurrentProcessId
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
Sleep
lstrcmpA
CopyFileA
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ