ijgbosttwx
Static task
static1
Behavioral task
behavioral1
Sample
0b4eea6000a752bdf392f9b044ed2de0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b4eea6000a752bdf392f9b044ed2de0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0b4eea6000a752bdf392f9b044ed2de0_JaffaCakes118
-
Size
144KB
-
MD5
0b4eea6000a752bdf392f9b044ed2de0
-
SHA1
16998d15c4da596cd4949b56dd27551bd965bb60
-
SHA256
188e1091edd9f94c802e884b7c93e76c9f8b36bb4f3e9e1c81ccbd6809802004
-
SHA512
79d9ce7c00c1aeb3433ba11e6cbd578db4aa07fa42e91095712cfd7ed9c0f795f77fdab6243343ce78756d59a7bc8a9d43a4d27de3b88db439cd88560b093ab1
-
SSDEEP
3072:UO6fFESNM4LD0n0qobmHq+qS1U5de8oQH+m5cD6B3tKpBBS8awz04:UXW4309Zbh18eh3rS8a3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b4eea6000a752bdf392f9b044ed2de0_JaffaCakes118
Files
-
0b4eea6000a752bdf392f9b044ed2de0_JaffaCakes118.dll windows:4 windows x86 arch:x86
5c525eecea2e3e358f6bc20043fdf02a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
advapi32
RegCloseKey
RegSetValueExW
RegSetValueExA
InitializeSecurityDescriptor
UnlockServiceDatabase
GetSecurityDescriptorControl
GetTokenInformation
RegQueryValueExA
version
VerQueryValueW
kernel32
RtlUnwind
LCMapStringA
GetProcAddress
IsValidLocale
GetModuleHandleA
LoadLibraryA
GetHandleInformation
VirtualFree
ExitThread
HeapCreate
lstrcmpA
GlobalLock
lstrcpynA
InterlockedIncrement
SystemTimeToFileTime
CopyFileW
lstrcatA
GetShortPathNameA
CreateFileA
GetCurrentThread
GetLastError
GetCurrentDirectoryA
SetLastError
HeapFree
lstrlenA
ReadFile
GetLocaleInfoW
SetCurrentDirectoryA
ResetEvent
GetVersion
LCMapStringW
IsBadStringPtrW
SetPriorityClass
CreateDirectoryA
GetStringTypeA
CreateProcessW
SetEndOfFile
GetTickCount
FreeLibrary
SetErrorMode
FindResourceExW
SetEvent
GetStringTypeW
GlobalUnlock
lstrcmpiA
ExitProcess
lstrcmpiW
GetFileSize
LoadResource
CreateFileMappingW
CreateEventA
GetCurrentDirectoryW
GetStartupInfoW
SetCurrentDirectoryW
GetThreadLocale
CreateProcessA
WideCharToMultiByte
GetCPInfo
LoadLibraryW
InterlockedDecrement
VirtualAlloc
GetSystemTime
HeapAlloc
GetCommandLineA
HeapDestroy
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
CloseHandle
UnhandledExceptionFilter
GetACP
GetOEMCP
FlushFileBuffers
SetStdHandle
SetFilePointer
MultiByteToWideChar
Exports
Exports
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ