Static task
static1
Behavioral task
behavioral1
Sample
05c8b62f1eacbd555a1ede44746ec6df_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05c8b62f1eacbd555a1ede44746ec6df_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
05c8b62f1eacbd555a1ede44746ec6df_JaffaCakes118
-
Size
237KB
-
MD5
05c8b62f1eacbd555a1ede44746ec6df
-
SHA1
1ba1ea560ffe9c69f8576701aa75ebea58306801
-
SHA256
5998ac92916b3955996eaf11b4c3b768bd29d97c00fa78ddd9e3d7236f58e15b
-
SHA512
609cacd068a8b06fc2d2aac9de2915e34b548e94ec02f455e1051bdd3d3d045e33ce9f37a7aa6be5696a7bdf0eef23ea2b7b9b2c2ae029961d13379c2afbe5d8
-
SSDEEP
3072:fhv+G0K/6nyCkdEt7bvaUOAfYVLaTh/NRY48+iya7RPCkxSeZ3XPEQNkaS:f1AyCkdEt7bvaUd+LSX+yaN6kRZPEZa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05c8b62f1eacbd555a1ede44746ec6df_JaffaCakes118
Files
-
05c8b62f1eacbd555a1ede44746ec6df_JaffaCakes118.dll windows:4 windows x86 arch:x86
7dbff0788f942392fae78a5a58158aed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shell32
SHGetDesktopFolder
Shell_NotifyIconA
DragQueryFileA
SHGetSpecialFolderLocation
SHGetFolderPathA
user32
LoadStringA
SendMessageW
InsertMenuA
SetClipboardData
GetParent
GetWindowDC
kernel32
VirtualAllocEx
LoadLibraryA
ExitProcess
LocalAlloc
GetProcAddress
IsBadReadPtr
VirtualAlloc
GetVersionExA
ExitThread
LoadLibraryExA
GetModuleHandleW
GetCommandLineW
GetModuleHandleA
lstrlenA
shlwapi
SHQueryInfoKeyA
SHEnumValueA
PathIsDirectoryA
SHDeleteValueA
PathIsContentTypeA
SHStrDupA
SHGetValueA
SHDeleteKeyA
PathGetCharTypeA
PathFileExistsA
version
VerInstallFileA
msvcrt
sqrt
time
wcsncmp
swprintf
atan
memcpy
tolower
comctl32
ImageList_Read
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Write
ImageList_Draw
ImageList_DrawEx
ImageList_Add
ImageList_Destroy
ImageList_DragShowNolock
ole32
CreateStreamOnHGlobal
CoCreateFreeThreadedMarshaler
advapi32
RegLoadKeyA
RegDeleteValueA
RegEnumKeyA
GetUserNameA
RegDeleteValueA
RegEnumKeyA
comdlg32
FindTextA
gdi32
CreateBrushIndirect
SetPixel
GetRgnBox
BitBlt
SetTextColor
GetDIBits
GetPaletteEntries
CreatePalette
CreatePenIndirect
LineTo
GetObjectA
GetDIBColorTable
GetPixel
CreateDIBitmap
GetDIBits
CreateDIBSection
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 1024B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ