ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
fd3a8f573e834cbaeac7bbc598036a68_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd3a8f573e834cbaeac7bbc598036a68_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fd3a8f573e834cbaeac7bbc598036a68_JaffaCakes118
-
Size
138KB
-
MD5
fd3a8f573e834cbaeac7bbc598036a68
-
SHA1
c8db4010f9826c9944cbf178944d23dab462694e
-
SHA256
bf5ccacbe90eb92f1af93225eba8903e5b7aee23b19eb15703110190dbb2099e
-
SHA512
b013ed9e792ec439e95973993b6eec256a5bb7db2d1a5335e2ea46a6c9193a5fc51f4b5ee53f8874fc0754a5d33dd6817716111ba445c4977d1f03fadadbea04
-
SSDEEP
3072:m/asxvR03h91cMDYGAsVkCRMUoRIlctFzPF0XyCy:mSshMhnpDYGAsVk8MfIlctFzPvCy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd3a8f573e834cbaeac7bbc598036a68_JaffaCakes118
Files
-
fd3a8f573e834cbaeac7bbc598036a68_JaffaCakes118.dll windows:4 windows x86 arch:x86
bf2c4dba05747b147f36c7e47d4cd5f6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
GetProcAddress
LoadLibraryA
VirtualFree
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
LocalFree
FindNextFileA
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
VirtualAllocEx
LeaveCriticalSection
Sleep
DeleteCriticalSection
InitializeCriticalSection
Process32Next
Process32First
CreateToolhelp32Snapshot
MoveFileExA
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
HeapAlloc
GetProcessHeap
UnmapViewOfFile
OutputDebugStringA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
CopyFileA
lstrlenA
OpenProcess
LocalReAlloc
LocalSize
lstrcmpiA
GetCurrentThreadId
RaiseException
InterlockedExchange
msvcrt
_ftol
strlen
strstr
memcmp
strchr
malloc
strcpy
strcmp
free
_except_handler3
strrchr
strcat
strncpy
ceil
strncmp
_errno
strncat
realloc
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
memmove
__CxxFrameHandler
memcpy
atoi
??3@YAXPAX@Z
_strupr
_strnicmp
_strrev
memset
??2@YAPAXI@Z
_strcmpi
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
msvfw32
ICSeqCompressFrameEnd
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICCompressorFree
Exports
Exports
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Helpless Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ujyhkuy Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Helpless Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ