Static task
static1
Behavioral task
behavioral1
Sample
10db45a0407230c1501656aaefddff71_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10db45a0407230c1501656aaefddff71_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
10db45a0407230c1501656aaefddff71_JaffaCakes118
-
Size
233KB
-
MD5
10db45a0407230c1501656aaefddff71
-
SHA1
746a85d58402881ae10c13a92bf8f4af8faf7a62
-
SHA256
02b54519f836ec5bc4ba375b24383dd5e302cedec1797fbe1e5148d123e5b037
-
SHA512
f8e19c8960cff14644185b15435f2e8e31df2587d0affc188250dd6ed37fe686469cbc110cfd9f4fc6d617c4e3fe7d7e0d5aec244a384b498def09541128ed35
-
SSDEEP
6144:AX3/gc14bnDLiqx4HYkwoqjEgCCdGMUvvbC5oL:AX3/d14bnDeq0Y9VEgFd2nbC5oL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10db45a0407230c1501656aaefddff71_JaffaCakes118
Files
-
10db45a0407230c1501656aaefddff71_JaffaCakes118.dll windows:4 windows x86 arch:x86
5f43adca85b2d6bfe736cf146748e6f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetDiskFreeSpaceA
Sleep
lstrlenW
FindClose
GetSystemDefaultLangID
GetModuleHandleA
GetOEMCP
GetACP
VirtualQuery
GetCurrentThread
SetThreadLocale
IsBadReadPtr
GetStartupInfoA
LocalReAlloc
SetErrorMode
WideCharToMultiByte
HeapDestroy
WaitForSingleObject
GetProcAddress
WriteFile
ExitThread
LoadLibraryA
SizeofResource
GetStringTypeW
GetCommandLineA
EnterCriticalSection
ExitProcess
GetProcessHeap
GetCurrentThreadId
GetCommandLineW
DeleteFileA
LocalAlloc
lstrlenA
FindResourceA
GetVersionExA
GetModuleHandleW
GlobalFindAtomA
lstrcmpA
GetLastError
CreateThread
GetFileSize
VirtualAllocEx
GlobalDeleteAtom
IsBadHugeReadPtr
GlobalAddAtomA
GetTickCount
RaiseException
SetEvent
GetStringTypeA
GetLocaleInfoA
LockResource
SetLastError
GetUserDefaultLCID
EnumCalendarInfoA
HeapAlloc
lstrcatA
GetModuleFileNameA
ResetEvent
LoadLibraryExA
lstrcpynA
FormatMessageA
GlobalAlloc
shell32
Shell_NotifyIconA
SHFileOperationA
SHGetFileInfoA
SHGetDiskFreeSpaceA
DragQueryFileA
oleaut32
SysFreeString
SafeArrayCreate
shlwapi
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
SHDeleteValueA
SHQueryValueExA
PathFileExistsA
SHStrDupA
msvcrt
atol
sin
memset
sqrt
fabs
user32
TrackPopupMenu
SetForegroundWindow
SetTimer
SetWindowLongA
SetParent
SetWindowsHookExA
SetClipboardData
SetCapture
ShowScrollBar
SetScrollRange
SetPropA
SetWindowPlacement
TranslateMessage
TranslateMDISysAccel
SetMenu
SetWindowPos
SetClassLongA
SetScrollInfo
SystemParametersInfoA
SetRect
SetMenuItemInfoA
SetCursor
SetWindowLongW
SetFocus
ShowWindow
SetWindowTextA
UnregisterClassA
SetScrollPos
ShowOwnedPopups
UnhookWindowsHookEx
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 512B - Virtual size: 298B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adata Size: 162KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ddata Size: 1024B - Virtual size: 853B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ