GetIDialogFromDLL
Static task
static1
Behavioral task
behavioral1
Sample
faedf8c6f6ff80773488e20d94d35e6d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
faedf8c6f6ff80773488e20d94d35e6d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
faedf8c6f6ff80773488e20d94d35e6d_JaffaCakes118
-
Size
28KB
-
MD5
faedf8c6f6ff80773488e20d94d35e6d
-
SHA1
944b37cec10199b5f26109f93a806a22a7abd538
-
SHA256
0a3bef7898bba76a3fa6e28ae7b29ba153f56780e1bc83a4f8ab18f0bbb55b69
-
SHA512
90688ea1ae23d2a9b59b0a9f7d626b984518e4bb7e80f603616603dbd2fa0fe02ba3c0068c53c64aefa7749cff3a2a300e17f48afe9d186c2856823565ccb59d
-
SSDEEP
192:dE0USClLjaCJOY/4sbTUe9+qQ/1/zJvZvdW9+2Cp92xR4seMbLqyQ:+7XaCJOrsbX9+qQ/1qMoeMbL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource faedf8c6f6ff80773488e20d94d35e6d_JaffaCakes118
Files
-
faedf8c6f6ff80773488e20d94d35e6d_JaffaCakes118.dll windows:4 windows x86 arch:x86
95624c4d87545e6bc7cb7d73cbefbcba
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord860
ord537
ord1176
ord6877
ord5683
ord6467
ord1578
ord600
ord826
ord3181
ord535
ord1980
ord2781
ord4058
ord3178
ord2915
ord2818
ord356
ord2770
ord668
ord540
ord2919
ord5572
ord269
ord4129
ord858
ord800
ord1243
ord924
msvcrt
_adjust_fdiv
free
fclose
memchr
malloc
??3@YAXPAX@Z
memmove
__CxxFrameHandler
sprintf
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
kernel32
LocalFree
DisableThreadLibraryCalls
OpenMutexA
lstrcpyA
LoadLibraryA
FreeLibrary
GetEnvironmentVariableA
WritePrivateProfileStringA
DeleteFileA
WinExec
GetModuleFileNameA
GetProcAddress
ExitProcess
LocalAlloc
user32
wsprintfA
advapi32
RegQueryValueExA
RegOpenKeyExA
msvcp60
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1ios_base@std@@UAE@XZ
??1?$basic_filebuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
?_Initcvt@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?_Init@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXPAU_iobuf@@W4_Initfl@12@@Z
?__Fiopen@std@@YAPAU_iobuf@@PBDH@Z
?clear@ios_base@std@@QAEXH_N@Z
??_7?$basic_ofstream@DU?$char_traits@D@std@@@std@@6B@
??0?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAE@PAU_iobuf@@@Z
?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
??0ios_base@std@@IAE@XZ
??_8?$basic_ofstream@DU?$char_traits@D@std@@@std@@7B@
ws2_32
WSAStartup
gethostbyname
htons
socket
send
recv
closesocket
WSACleanup
connect
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 842B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ