Init
Static task
static1
Behavioral task
behavioral1
Sample
07787e3824751dc0bf5c337fe63cbcbd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07787e3824751dc0bf5c337fe63cbcbd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
07787e3824751dc0bf5c337fe63cbcbd_JaffaCakes118
-
Size
26KB
-
MD5
07787e3824751dc0bf5c337fe63cbcbd
-
SHA1
0b778fec150d72f1c19d80f1040ee5c15833774e
-
SHA256
ca6686bd3ad804da84869e236f35b603fc673578d17136bd96669e5006cf09ac
-
SHA512
bc92cffea593a7ef445eb1a3afc22761960240ca4e8ffc55f6ec1f72dce1b072292eb6c279217ac4a619ffb7c809a769bb162d08504dde29175f9ab135420506
-
SSDEEP
768:2CNk246PWWlUdJoD0zu9ZCR04xoxx4nrWhjBiMn:2CK73J60zu9AR0468W9B3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07787e3824751dc0bf5c337fe63cbcbd_JaffaCakes118
Files
-
07787e3824751dc0bf5c337fe63cbcbd_JaffaCakes118.dll windows:4 windows x86 arch:x86
cc209301730867ba2b8b2b5566ab5c73
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
CreateThread
TerminateThread
GetCurrentProcessId
GetPrivateProfileStringA
GetPrivateProfileIntA
GetComputerNameA
InitializeCriticalSection
GlobalFree
GlobalUnlock
VirtualProtectEx
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
GlobalAlloc
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
VirtualAlloc
WritePrivateProfileStringA
GetLastError
CreateMutexA
ExitProcess
WriteProcessMemory
WaitForSingleObject
ResetEvent
SetEvent
CreateEventA
DeleteFileA
GetModuleFileNameA
GetCurrentProcess
GetCurrentThreadId
CreateProcessA
GetCurrentThread
GlobalLock
ReadProcessMemory
CloseHandle
IsBadReadPtr
user32
GetWindowThreadProcessId
GetWindow
GetClassNameA
GetWindowTextA
TranslateMessage
CallNextHookEx
SetWindowsHookExA
GetMessageA
GetDesktopWindow
DispatchMessageA
FindWindowExA
UnhookWindowsHookEx
SendMessageA
GetForegroundWindow
FindWindowA
advapi32
RegSetValueExA
RegCreateKeyExA
RegCloseKey
shlwapi
PathFileExistsA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
msvcrt
_strlwr
_adjust_fdiv
malloc
_initterm
free
??3@YAXPAX@Z
sscanf
strrchr
fread
strcat
??2@YAPAXI@Z
memset
_stricmp
wcslen
memcpy
sprintf
strchr
strncpy
strcmp
strlen
fclose
fopen
strstr
strcpy
Exports
Exports
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdt Size: 512B - Virtual size: 281B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ