Static task
static1
Behavioral task
behavioral1
Sample
0c842c8e7beedbab537d6ab2cf1a7a0d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c842c8e7beedbab537d6ab2cf1a7a0d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0c842c8e7beedbab537d6ab2cf1a7a0d_JaffaCakes118
-
Size
120KB
-
MD5
0c842c8e7beedbab537d6ab2cf1a7a0d
-
SHA1
79a0e7c90b70beee806666476a42a033dcf68300
-
SHA256
7a28d16fba1faea42fa9960fc12cab8287a9a07ffefca48155896e7a3a16bb56
-
SHA512
b4af1c25a0ae4133b8defbe4eaba3057be7a9db84a646d2862f33e7eb7089b9bcac85c0cf43b88beeda90ffe9f8ee214fab312f37e3b3fc499060b74fedf61fd
-
SSDEEP
3072:yiBdAzp/Kl53IvXwvsdMwEAJk7N6S2Q7pb:5gzcl53ewvjlNwQ7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c842c8e7beedbab537d6ab2cf1a7a0d_JaffaCakes118
Files
-
0c842c8e7beedbab537d6ab2cf1a7a0d_JaffaCakes118.dll windows:4 windows x86 arch:x86
5a9a35f413bdeffe2247e957d047f590
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
dinput
DirectInputCreateW
ole32
PropVariantClear
StgPropertyLengthAsVariant
IsEqualGUID
winmm
auxOutMessage
joyGetPos
mciGetDeviceIDFromElementIDW
midiOutCacheDrumPatches
midiOutGetVolume
mmioCreateChunk
waveOutRestart
waveOutPrepareHeader
waveInStart
waveInReset
timeKillEvent
timeBeginPeriod
shell32
ShellExecuteA
SHFileOperationW
SHGetSpecialFolderPathW
kernel32
lstrlenA
BeginUpdateResourceA
CloseHandle
CreateFileA
CreateSemaphoreA
DeleteCriticalSection
EnumTimeFormatsA
EraseTape
ExitProcess
GetCommandLineA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcessId
GetFileInformationByHandle
GetLogicalDriveStringsW
GetModuleHandleA
GetTempPathW
GetTimeZoneInformation
GetVersionExA
GetVolumePathNameW
GetWindowsDirectoryA
GlobalAlloc
HeapCreate
HeapFree
LocalShrink
MulDiv
OpenJobObjectW
ReadFile
SetConsoleScreenBufferSize
TlsGetValue
WaitForMultipleObjectsEx
_llseek
HeapAlloc
user32
CreateWindowExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnumPropsA
GetForegroundWindow
GetKeyState
GetTopWindow
LoadIconA
MessageBoxW
CharToOemA
OpenClipboard
PeekMessageA
RegisterClassA
RegisterShellHookWindow
RemoveMenu
SetRect
SetSystemCursor
SetUserObjectSecurity
ShowWindow
TranslateMessage
UpdateWindow
CharLowerW
CharLowerBuffA
MsgWaitForMultipleObjects
ws2_32
WSAGetLastError
WSAStringToAddressA
WSAUnhookBlockingHook
socket
listen
connect
closesocket
gethostbyname
htons
advapi32
BuildExplicitAccessWithNameW
CancelOverlappedAccess
SystemFunction013
SetUserFileEncryptionKey
SetFileSecurityW
RegRestoreKeyW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LsaQueryTrustedDomainInfo
IsValidSecurityDescriptor
InitializeSecurityDescriptor
GetTrusteeNameW
GetSecurityDescriptorDacl
GetFileSecurityW
GetCurrentHwProfileA
GetAclInformation
GetAce
EqualSid
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ