Static task
static1
Behavioral task
behavioral1
Sample
fc30d1afe7b46ca6139edf2ba1309d34_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc30d1afe7b46ca6139edf2ba1309d34_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fc30d1afe7b46ca6139edf2ba1309d34_JaffaCakes118
-
Size
168KB
-
MD5
fc30d1afe7b46ca6139edf2ba1309d34
-
SHA1
4c060f5520e60d4130bab179dfb578658bd984ac
-
SHA256
b3c9a67e7c7708fe4b4bcf360e041bbf3abee3a81976d54d3a088eed5d6bfe14
-
SHA512
f3ab4cc0e1d040c9221704db940cfb18fe534daff3cba874169f5ff2a956dcac549cba7fb3238218dfc87385ed5ca0ea1f8cc8c2bc86f586829154ed965be53a
-
SSDEEP
3072:lEIMVMc1r+8oGdeWqLIufvp2IZwt7I92zYcrvUU3Ofxvj74Fg1vhXBxbbEj0mNLJ:CVMAN5d9IL5tZwk2UEv36h7jvhXB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc30d1afe7b46ca6139edf2ba1309d34_JaffaCakes118
Files
-
fc30d1afe7b46ca6139edf2ba1309d34_JaffaCakes118.dll windows:4 windows x86 arch:x86
fa86595294e370d45283d3b19895babc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemTime
FreeLibrary
GetProcAddress
CompareFileTime
GetDriveTypeW
CreateMutexW
DeleteCriticalSection
GetModuleFileNameW
GetVolumePathNameW
CreateDirectoryW
SetLastError
RaiseException
EnterCriticalSection
OpenFileMappingW
DuplicateHandle
CompareStringW
LoadLibraryA
LeaveCriticalSection
ExpandEnvironmentStringsW
CreateProcessW
LoadLibraryExW
lstrlenW
LoadResource
SizeofResource
lstrlenA
lstrcpynW
lstrcatW
InitializeCriticalSection
InterlockedDecrement
lstrcpyW
SetFilePointer
TlsSetValue
GetTickCount
IsBadWritePtr
WideCharToMultiByte
MultiByteToWideChar
GetACP
lstrcmpiA
LoadLibraryW
lstrcmpA
lstrcmpW
DeleteFileA
DeleteFileW
ReadFile
TlsGetValue
lstrcpynA
GetProfileIntW
CloseHandle
GetFileAttributesW
LocalAlloc
LocalFree
InterlockedIncrement
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileW
HeapFree
GetProcessHeap
HeapAlloc
GetWindowsDirectoryW
GetCommandLineA
GlobalFree
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
InterlockedExchange
GetCommandLineW
Sleep
GlobalUnlock
lstrcmpiW
VirtualProtect
FindResourceW
GlobalAlloc
user32
GetMenu
GetCursorPos
InvalidateRect
CheckMenuRadioItem
IsWindowVisible
MoveWindow
BeginDeferWindowPos
EndDeferWindowPos
CheckRadioButton
SetFocus
UpdateWindow
GetWindowRect
GetDC
ReleaseDC
ShowWindow
GetParent
EnumChildWindows
EnableWindow
GetDlgItem
CharLowerW
PostMessageW
PostMessageA
SetWindowTextW
SetWindowTextA
SystemParametersInfoW
SystemParametersInfoA
SendDlgItemMessageW
SendDlgItemMessageA
SendMessageW
SendMessageA
LoadStringA
GetSysColor
CheckMenuItem
GetActiveWindow
MessageBoxW
GetSystemMetrics
LoadStringW
BeginPaint
EndPaint
SetScrollInfo
DefWindowProcW
FillRect
SetRect
SetWindowPos
GetClientRect
GetWindowLongW
TranslateMessage
IsWindow
GetPropW
DestroyWindow
RemovePropW
PostQuitMessage
SetPropW
SetTimer
CharNextW
CharPrevW
SetWindowLongW
DispatchMessageW
advapi32
RegQueryValueExW
RegEnumValueA
RegQueryValueExA
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegisterEventSourceA
DeregisterEventSource
ReportEventW
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
SetTokenInformation
InitializeSid
GetSidLengthRequired
CreateRestrictedToken
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
gdi32
GetFontResourceInfoW
AddFontResourceW
RemoveFontResourceW
CreateCompatibleDC
DeleteObject
SelectObject
DeleteDC
ole32
StringFromCLSID
CoGetMalloc
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
ReleaseStgMedium
PropVariantClear
CoTaskMemFree
msvcr71
_onexit
memmove
_vsnwprintf
memset
_amsg_exit
free
_XcptFilter
_wcsnicmp
wcschr
_adjust_fdiv
_initterm
strncat
memcpy
_wcslwr
realloc
malloc
wcslen
wcsncpy
__CppXcptFilter
__dllonexit
_except_handler3
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ