Static task
static1
Behavioral task
behavioral1
Sample
fc0b2377d5b707ab1daf76ceabd85a83_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fc0b2377d5b707ab1daf76ceabd85a83_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fc0b2377d5b707ab1daf76ceabd85a83_JaffaCakes118
-
Size
100KB
-
MD5
fc0b2377d5b707ab1daf76ceabd85a83
-
SHA1
d41d737e913581ad1771015d6ae8ed6ac0ec6195
-
SHA256
9d0d794376781a7b80181dd77a97a2c27da5a1bf3ad4659b658f43bbaffe1f3a
-
SHA512
d5c95dbf4422c32862da31a0fa9c2bce3e264ae507ef8cb22de2778f216dc309173be6b0f8e37b59d18307a2944be66373b2937933d95592a24fa80da88d013f
-
SSDEEP
1536:JzpxQaklLkdbbCzJ7VyzypXbPvt/eZHcpUAIOmkBEGpFTPKf67OWugLrppa:JmlLEDAIO7PKCoYS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc0b2377d5b707ab1daf76ceabd85a83_JaffaCakes118
Files
-
fc0b2377d5b707ab1daf76ceabd85a83_JaffaCakes118.dll windows:5 windows x86 arch:x86
14ae1c15141300f713f0581d92f6f672
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
atoi
wcsrchr
strrchr
srand
rand
strstr
strlen
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
memcpy
_except_handler3
shlwapi
PathFileExistsA
SHGetValueA
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
ws2_32
socket
closesocket
gethostbyname
send
shutdown
WSACleanup
htons
WSAStartup
connect
gethostname
WSAEventSelect
setsockopt
inet_addr
iphlpapi
GetAdaptersInfo
wintrust
WinVerifyTrust
kernel32
CreateDirectoryA
GetFileAttributesA
ExitProcess
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
VirtualQuery
SetEndOfFile
FreeLibrary
WaitForSingleObject
SetEvent
VirtualFree
WriteFile
OpenProcess
Sleep
CreateEventA
ReadFile
GetSystemDirectoryA
ExitThread
MultiByteToWideChar
GetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
GetTempPathA
DeleteFileA
FindResourceA
FreeResource
LoadResource
Process32First
GetSystemTimeAsFileTime
SetFileTime
GetDriveTypeA
SizeofResource
GetExitCodeProcess
CreateProcessA
lstrcatA
Process32Next
LockResource
DeviceIoControl
SetNamedPipeHandleState
LoadLibraryExA
CreateToolhelp32Snapshot
GetFileTime
GetVersionExA
GetLogicalDrives
lstrcpyA
ConnectNamedPipe
TerminateThread
Thread32Next
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
OpenThread
GetCurrentProcess
GetVolumeInformationA
lstrlenW
lstrcmpiW
VirtualProtect
lstrcpyW
CreateThread
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
WinExec
lstrcpynA
FindFirstFileA
GetLogicalDriveStringsA
FindClose
WaitForMultipleObjects
FindNextFileA
GetTickCount
SetFileAttributesA
GetExitCodeThread
FlushViewOfFile
RemoveDirectoryA
CopyFileA
TerminateProcess
MoveFileExA
LocalFree
user32
GetInputState
PostMessageA
wsprintfW
FindWindowA
wsprintfA
PostThreadMessageA
GetMessageA
UnloadKeyboardLayout
SetProcessWindowStation
SetThreadDesktop
OpenDesktopA
OpenWindowStationA
LoadKeyboardLayoutA
advapi32
OpenServiceA
CloseServiceHandle
OpenProcessToken
GetTokenInformation
RegSetValueExA
RegQueryValueExA
CreateServiceA
StartServiceA
RegCreateKeyExA
QueryServiceStatus
RegDeleteValueA
OpenSCManagerA
DuplicateTokenEx
CreateProcessAsUserA
RegSetValueExW
AdjustTokenPrivileges
RegFlushKey
RegSaveKeyA
LookupPrivilegeValueA
RegQueryValueExW
RegRestoreKeyA
DeleteService
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
RegOpenKeyA
ControlService
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE