WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
02174f3177213cc1ab54639d6e24b273_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02174f3177213cc1ab54639d6e24b273_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
02174f3177213cc1ab54639d6e24b273_JaffaCakes118
-
Size
344KB
-
MD5
02174f3177213cc1ab54639d6e24b273
-
SHA1
5bc6ba4dcd1c36ff4744f2cbdbeeb85988ad0b54
-
SHA256
b47def5da809bfbbbad0b33e7162fc331effa5fc20b870c292ea706213bf7055
-
SHA512
2fcdf5044793f6f44382efc2d8d3b912454686c7172c223dffe58d3bb32e7f7d3ebda77e1128629fea9eff5ac8f9d9dc7e55c956f165a72764afcdafd621f0d4
-
SSDEEP
6144:3o15zuhbywaTJESE9zDo17rsND4dlxydTBPtv9IGTE:4bqOQl9zDo+W4dTLeGTE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02174f3177213cc1ab54639d6e24b273_JaffaCakes118
Files
-
02174f3177213cc1ab54639d6e24b273_JaffaCakes118.dll windows:4 windows x86 arch:x86
210d3f96fcd3796446d8593df70da3d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
netapi32
Netbios
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
GetFileAttributesA
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
VirtualAlloc
GetCommandLineA
RtlUnwind
ExitProcess
RaiseException
ReadFile
SetStdHandle
GetFileType
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetExitCodeProcess
GetLocaleInfoW
SetEnvironmentVariableA
GetThreadLocale
MoveFileA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
InterlockedIncrement
GlobalFlags
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleFileNameW
LocalAlloc
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalAddAtomA
SetLastError
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalLock
lstrcmpA
GlobalAlloc
GetModuleHandleA
GetCurrentThreadId
lstrlenA
InterlockedExchange
CompareStringW
GetVersion
CompareStringA
WideCharToMultiByte
HeapFree
GetProcessHeap
HeapAlloc
MultiByteToWideChar
ReleaseMutex
WaitForSingleObject
CreateMutexA
OpenMutexA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetTickCount
CreateProcessA
CreateThread
GetModuleFileNameA
GetSystemDirectoryA
ExpandEnvironmentStringsA
OpenProcess
FreeLibrary
GetVersionExA
Process32Next
GetProcAddress
Process32First
LoadLibraryA
CreateToolhelp32Snapshot
GetPrivateProfileStringA
CloseHandle
WritePrivateProfileStringA
DeleteFileA
SetFileTime
GetPrivateProfileIntA
CreateDirectoryA
GetFileTime
GetLastError
CreateFileA
Sleep
GetCurrentProcessId
HeapSize
CreateFileW
user32
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
GetSysColor
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
GetKeyState
GetCursorPos
ValidateRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
DestroyMenu
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
CharUpperA
DispatchMessageA
TranslateMessage
PeekMessageA
FindWindowA
PostMessageA
GetWindowThreadProcessId
IsWindowVisible
GetWindow
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetDlgItem
GetWindowLongA
LoadCursorA
GetSysColorBrush
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
GetUserNameA
OpenProcessToken
RegSetValueExA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
VariantInit
VariantChangeType
VariantClear
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
ws2_32
gethostbyname
getpeername
closesocket
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
Exports
Exports
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ