Static task
static1
Behavioral task
behavioral1
Sample
fd0cc1d72b514e681cd0efc01d49549f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd0cc1d72b514e681cd0efc01d49549f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fd0cc1d72b514e681cd0efc01d49549f_JaffaCakes118
-
Size
108KB
-
MD5
fd0cc1d72b514e681cd0efc01d49549f
-
SHA1
5629421835b1ca0a9af0195d58aa9211667f6b05
-
SHA256
15d1e6bde562c00aedd6d19bc78e899c6f46dcf0590b06902198a3ad0dfac7c0
-
SHA512
43b806e9928fc6346c3cb2f2548b92d010fd7a3aa66aadd51a07fb4306be14aa6980ec01b1d7f503a157d0bc02e961d37ccae9ff175a1176178b1a7069426d3f
-
SSDEEP
1536:xZs2YObpWmXit8NXQ/1FudrHRG4DWA+N0wj387n7JqcIwxdalPbuOb:02YsICgdFudrHR4NNBMb7JqcrxiPb7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd0cc1d72b514e681cd0efc01d49549f_JaffaCakes118
Files
-
fd0cc1d72b514e681cd0efc01d49549f_JaffaCakes118.dll windows:4 windows x86 arch:x86
510169a8dab4cff61c75a3e9d59e6ffe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetPrivateProfileSectionW
GetStringTypeExA
GetSystemDefaultLangID
GetSystemInfo
GetTempPathW
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalAddAtomA
HeapAlloc
GetModuleHandleA
MulDiv
OpenEventW
OpenJobObjectW
ReadFile
SetEnvironmentVariableA
SetFileTime
TlsGetValue
WaitForMultipleObjectsEx
lstrcmpA
GetFileAttributesExA
GetCurrentProcessId
GetConsoleOutputCP
GetConsoleAliasA
GetCommandLineA
GetBinaryTypeA
FormatMessageA
FlushConsoleInputBuffer
FindNextVolumeW
FindAtomW
FindAtomA
ExitProcess
EnumTimeFormatsA
DuplicateHandle
DeleteCriticalSection
CreateSemaphoreA
CloseHandle
BindIoCompletionCallback
HeapCreate
Beep
advapi32
LookupPrivilegeNameW
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaSetInformationTrustedDomain
LsaRemoveAccountRights
AddAccessDeniedAce
I_ScSetServiceBitsA
GetTrusteeNameW
GetSecurityDescriptorDacl
GetAclInformation
GetAce
FileEncryptionStatusA
CancelOverlappedAccess
BuildExplicitAccessWithNameW
shell32
SHFileOperationW
ShellExecuteA
SHGetSpecialFolderPathW
winmm
PlaySoundW
WOW32DriverCallback
midiOutSetVolume
mmioInstallIOProcA
mod32Message
timeBeginPeriod
timeKillEvent
waveInGetDevCapsA
waveInStart
waveOutRestart
waveOutUnprepareHeader
midiInStart
ole32
IsEqualGUID
StgPropertyLengthAsVariant
PropVariantClear
ws2_32
closesocket
socket
htons
WSAGetLastError
WSAUnhookBlockingHook
WSCDeinstallProvider
connect
gethostbyname
dinput
DirectInputCreateW
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
user32
UpdateWindow
TranslateMessage
ShowWindow
SetUserObjectSecurity
SetSystemCursor
SetRect
RemoveMenu
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClassA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
GetTopWindow
GetKeyState
GetForegroundWindow
GetCaretPos
EnumPropsA
EmptyClipboard
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CharToOemA
CharLowerBuffA
BeginDeferWindowPos
CharLowerW
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ