Static task
static1
Behavioral task
behavioral1
Sample
ffc05c11bb6425569205793c440ffe28_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffc05c11bb6425569205793c440ffe28_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ffc05c11bb6425569205793c440ffe28_JaffaCakes118
-
Size
175KB
-
MD5
ffc05c11bb6425569205793c440ffe28
-
SHA1
31fac2b2a26e5ab5c37e9f03030c0a20ab622af7
-
SHA256
35ff7bc39684f8b7196a193fd27cec0b7a7ebdc1ebb906a44de5119f5e794d52
-
SHA512
7ec6aa08d515f7f23aa5c97762a85c66ff1307b88c6d5387a60454c0d536612e824eff74941bc305c0bfc49a8d40549ac27e5019a054dbbf2b4bc059cd551d32
-
SSDEEP
3072:ZDTeGF7Ms6wUDrhou9pFaN9tEowIzS8zlXZU54JZIbmM2U6k2X94hW2otKUgwXYN:8iMs6Bhouj/o1OA5ZUaRMX29vOUgwI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffc05c11bb6425569205793c440ffe28_JaffaCakes118
Files
-
ffc05c11bb6425569205793c440ffe28_JaffaCakes118.dll windows:4 windows x86 arch:x86
711210a82a861d0ccd25ff9bc5de16f3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLogicalDrives
FreeLibrary
LeaveCriticalSection
GetProcAddress
EnterCriticalSection
SetLastError
LocalFree
LocalAlloc
CloseHandle
SetEndOfFile
SetFilePointer
CreateFileW
lstrcmpW
DeleteFileW
SetFileAttributesW
GetFileAttributesW
WaitForSingleObject
FindClose
FindNextFileW
FindFirstFileW
SetErrorMode
GetCurrentProcessId
CreateDirectoryW
GetTempPathW
LoadLibraryExW
GetCurrentProcess
CompareFileTime
GetDriveTypeW
GetExitCodeProcess
FindResourceW
WaitForMultipleObjects
GlobalLock
GlobalUnlock
LoadLibraryW
GetModuleHandleW
WideCharToMultiByte
ChangeTimerQueueTimer
CreateFileA
DeviceIoControl
InterlockedCompareExchange
GetProcessHeap
FormatMessageW
ExpandEnvironmentStringsW
MultiByteToWideChar
QueueUserWorkItem
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GlobalFree
lstrcpyW
Sleep
GlobalAlloc
GetComputerNameW
GetSystemDirectoryW
GetLastError
lstrcmpiW
lstrlenW
CreateProcessW
GetWindowsDirectoryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
HeapFree
GetTickCount
GetCommandLineA
SystemTimeToFileTime
VirtualProtect
user32
GetParent
SetTimer
RegisterClipboardFormatW
EnableWindow
MessageBoxW
GetLastActivePopup
LoadStringW
SendMessageW
wsprintfW
SendDlgItemMessageW
EndDialog
SetWindowPos
SetFocus
MoveWindow
GetWindowRect
GetDesktopWindow
GetDlgItemTextW
SetForegroundWindow
KillTimer
SetDlgItemTextW
LoadIconW
SetWindowTextW
DialogBoxParamW
GetDlgItem
SetWindowLongW
GetWindowLongW
WinHelpW
advapi32
RegEnumKeyW
CryptGenRandom
RegEnumValueW
CryptAcquireContextW
RegQueryInfoKeyW
RegCreateKeyExW
DuplicateTokenEx
ImpersonateLoggedOnUser
RevertToSelf
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
CryptReleaseContext
ole32
CoTaskMemFree
ReleaseStgMedium
CoCreateInstance
CoInitializeEx
CoUninitialize
CLSIDFromString
rpcrt4
RpcBindingSetAuthInfoExW
RpcBindingFree
RpcBindingFromStringBindingW
RpcRevertToSelf
msvcrt
wcscmp
_adjust_fdiv
malloc
_initterm
free
sprintf
wcsncmp
memmove
wcscat
wcsncpy
_wtol
_itow
_ltow
wcscpy
memset
_wcsicmp
wcschr
wcslen
wcsrchr
_vsnwprintf
_wtoi
_wcsnicmp
_except_handler3
??3@YAXPAX@Z
__CxxFrameHandler
msvcp60
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Ostd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ