Static task
static1
Behavioral task
behavioral1
Sample
0a16f63c64c5941d863977c5b91e739c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a16f63c64c5941d863977c5b91e739c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0a16f63c64c5941d863977c5b91e739c_JaffaCakes118
-
Size
85KB
-
MD5
0a16f63c64c5941d863977c5b91e739c
-
SHA1
be401cbf60578d2a9f438d51c62285fcf7d6b6f0
-
SHA256
aaec79cc96be1789d19d9d4dbfe739dfb08ccb7d002714e72c93e64f9b4c9cd5
-
SHA512
cf13b7348fcc5310580d782742b3faf572419ec1891f9e7d708c8fa95ca1da679672d697ee9506f6813837a0d827a6faa378e8dc52fbe6881c4024196b2ba7e3
-
SSDEEP
1536:7x2dsc9W+rglOoXaTN+SYMsiB8rWE4+8QINyYsSyldZXn1QWmH8Hehp1ze7M:lBcjrglOyyNpYTe+WbvQIN1sll3XCWmT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a16f63c64c5941d863977c5b91e739c_JaffaCakes118
Files
-
0a16f63c64c5941d863977c5b91e739c_JaffaCakes118.dll windows:4 windows x86 arch:x86
0a2b217a3e531173bba332781a1fc3fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ShowWindow
SetWindowTextA
SetWindowPos
SetWindowLongA
wsprintfA
SendMessageA
SendDlgItemMessageA
ReleaseDC
OemToCharA
wsprintfW
CharLowerA
SetDlgItemTextA
InsertMenuItemW
LoadStringA
LoadImageA
InvalidateRect
BeginPaint
InsertMenuItemA
GetWindowTextA
GetWindowRect
GetWindowLongA
GetWindow
GetSystemMetrics
GetSysColor
GetParent
GetDlgItemTextA
GetDlgItem
GetDC
GetClientRect
GetClassNameA
EndPaint
CreatePopupMenu
CharUpperW
CharUpperA
CharToOemA
CharLowerW
ole32
ReleaseStgMedium
kernel32
lstrcpynW
lstrcpynA
WriteFile
WriteConsoleW
WriteConsoleA
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
CloseHandle
CompareStringA
CreateDirectoryA
CreateFileA
CreateFileW
DeleteCriticalSection
DeleteFileA
DeleteFileW
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileAttributesA
GetFileAttributesW
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetNumberFormatA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFileTimeToFileTime
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
ord8
shell32
SHGetPathFromIDListA
DragQueryFileW
DragQueryFileA
ShellExecuteExA
gdi32
SelectObject
Polyline
Polygon
SetPixel
GetTextFaceA
GetPixel
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontA
CreateCompatibleDC
SetTextColor
TextOutA
GetTextMetricsA
advapi32
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ