Static task
static1
Behavioral task
behavioral1
Sample
09b5f2acd484b0fc708f90ece6bce96a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09b5f2acd484b0fc708f90ece6bce96a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
09b5f2acd484b0fc708f90ece6bce96a_JaffaCakes118
-
Size
1.0MB
-
MD5
09b5f2acd484b0fc708f90ece6bce96a
-
SHA1
19fafdb504c3d952df41e32fdfb35504a4519d16
-
SHA256
b45efa0a817c967a209ef63c210a750334556d9337f19a509606905cd95b1a94
-
SHA512
29b5defde99480f265f2df0a44575e79fcb0dc486a95a84ce009a855641fefc080fa27c244a789c104dd98e3f56876716ae7daa1a514574cba76efd4b1710d4c
-
SSDEEP
24576:9GvRV/ywQ1kr9Yb6QnEyriOBP9A0pBP9A0+G:9cRVRfBKeyP99HP99R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09b5f2acd484b0fc708f90ece6bce96a_JaffaCakes118
Files
-
09b5f2acd484b0fc708f90ece6bce96a_JaffaCakes118.dll windows:4 windows x86 arch:x86
cca6ea56099011774dcc2d3344a58209
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
RtlUnwind
HeapFree
HeapAlloc
GetCommandLineA
ExitProcess
TerminateProcess
RaiseException
CreateThread
ExitThread
HeapSize
HeapReAlloc
GetACP
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
SetStdHandle
IsBadReadPtr
IsBadCodePtr
SetEndOfFile
FlushFileBuffers
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
GetLastError
lstrcpynA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetModuleFileNameA
GlobalAlloc
GetCurrentThread
GlobalLock
GlobalUnlock
SetLastError
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
LocalFree
lstrcmpA
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
WaitForSingleObject
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
WriteFile
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileA
GetCurrentProcess
DuplicateHandle
GetFileType
SetFilePointer
FindResourceA
SizeofResource
LoadResource
LockResource
GetTempPathA
GetTickCount
MultiByteToWideChar
VirtualAlloc
DeleteFileA
user32
ShowWindow
IsWindowEnabled
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
GetCursorPos
ValidateRect
GetActiveWindow
TranslateMessage
GetMessageA
ClientToScreen
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
PostQuitMessage
SetCursor
UnregisterClassA
LoadStringA
GetClassNameA
PtInRect
GetSysColorBrush
DestroyMenu
LoadIconA
PostMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
IsWindowVisible
MoveWindow
GetTopWindow
GetParent
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
UnhookWindowsHookEx
SetCapture
DestroyWindow
GetDlgItem
SendMessageA
MessageBoxA
LoadBitmapA
GetClientRect
FillRect
SetWindowTextA
EnableWindow
LoadCursorA
ReleaseCapture
SubtractRect
IsWindow
GetDC
ReleaseDC
GetDlgCtrlID
gdi32
SetStretchBltMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreateCompatibleDC
CreateRectRgn
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
RestoreDC
SetDIBColorTable
StretchBlt
CombineRgn
FillRgn
GetCurrentObject
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetObjectA
GetStockObject
DeleteDC
CreateDIBSection
SelectObject
DeleteObject
BitBlt
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
comctl32
ord17
ole32
CoUninitialize
CoTaskMemFree
CoCreateInstance
olepro32
ord250
oleaut32
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 480KB - Virtual size: 479KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 116KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE