Static task
static1
Behavioral task
behavioral1
Sample
03cb87e667cd31645b6f4256c4c6cbaa_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03cb87e667cd31645b6f4256c4c6cbaa_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
03cb87e667cd31645b6f4256c4c6cbaa_JaffaCakes118
-
Size
309KB
-
MD5
03cb87e667cd31645b6f4256c4c6cbaa
-
SHA1
ae64cb01bcb9d57c0664e549e1f5abd57b8811ff
-
SHA256
1dfc7a89cc0686c1bc39d0fac7d22c4ef72fefbb7d966c0d6b04da78e8a82b01
-
SHA512
6bc61387d9275292a9923ba30d7af6ae0872c1261a7114c8a29f862c84a49a180ff323463f51e5253eaf30168a8b04b57e4acfaf75e1764133e5dd8316763bf0
-
SSDEEP
6144:Y2PxC8Qnq01y8tD0Nywj6iunA2o5afFI8qGCYDWY4A6buqPBR:JsBFyEm7Fu8wfFIhGNMz5R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03cb87e667cd31645b6f4256c4c6cbaa_JaffaCakes118
Files
-
03cb87e667cd31645b6f4256c4c6cbaa_JaffaCakes118.dll windows:4 windows x86 arch:x86
ff0f25ab7ed9fcd26b54ca8b1e99b550
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
DrawTextA
DrawMenuBar
DestroyMenu
DestroyIcon
DefDlgProcA
CreateMenu
CreateMDIWindowA
CreateDialogParamA
CreateDesktopW
CharToOemA
kernel32
ExitProcess
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcatA
SleepEx
SetLastError
RtlUnwind
OpenFileMappingA
MapViewOfFile
LeaveCriticalSection
CompareStringA
EnumResourceLanguagesA
EnumResourceNamesA
FindResourceA
GetFileSize
InitializeCriticalSection
Sections
.text Size: 66KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ