Static task
static1
Behavioral task
behavioral1
Sample
0e25b8eddd951fb36a7d902d44945060_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e25b8eddd951fb36a7d902d44945060_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0e25b8eddd951fb36a7d902d44945060_JaffaCakes118
-
Size
225KB
-
MD5
0e25b8eddd951fb36a7d902d44945060
-
SHA1
58ae430351ab6c91162a676ad905c4ee117668dc
-
SHA256
599afbaf664870ad31955d7d844d6509c3c73ed3a3de710f9e73c474ddf323fc
-
SHA512
516f2048fa84772bb788734402f05b7e40ae051a311a88780331a7487e3168e6d55293f99cf254e67bc2b951440b614f9b096fd3d179f5224d750452c0e4c56a
-
SSDEEP
6144:MBBDhBkuIS4PK4ygWoUjYIJH6fHbmrJ43HfXQS:qo/9PVyIqbsze4QS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e25b8eddd951fb36a7d902d44945060_JaffaCakes118
Files
-
0e25b8eddd951fb36a7d902d44945060_JaffaCakes118.dll windows:4 windows x86 arch:x86
ab7bcdec2899e6c7221c76ea0e36cc04
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
user32
ScrollWindow
RemoveMenu
OpenClipboard
RemovePropA
LoadCursorA
SetActiveWindow
ReleaseCapture
MessageBoxA
RegisterWindowMessageA
PostQuitMessage
ReleaseDC
MapWindowPoints
RedrawWindow
MessageBeep
MapVirtualKeyA
PeekMessageA
LoadStringA
SendMessageW
PeekMessageW
RegisterClipboardFormatA
RegisterClassA
LoadKeyboardLayoutA
LoadBitmapA
PostMessageA
LoadIconA
OffsetRect
OemToCharA
PtInRect
SendMessageA
ScreenToClient
comdlg32
GetFileTitleA
GetSaveFileNameA
ChooseColorA
FindTextA
gdi32
GetBitmapBits
CreatePenIndirect
CreateCompatibleBitmap
CreateBrushIndirect
GetDIBColorTable
CreatePalette
SaveDC
GetDIBits
LineTo
CreateDIBSection
comctl32
ImageList_DrawEx
ImageList_Remove
ImageList_DragShowNolock
ImageList_Destroy
ImageList_Create
ImageList_Add
ImageList_Write
advapi32
RegOpenKeyExA
RegQueryValueExA
kernel32
FreeResource
SetEndOfFile
lstrcpynA
FindResourceA
Sleep
MoveFileA
GetVersionExA
IsBadReadPtr
GetLocalTime
GetThreadLocale
SetFilePointer
lstrlenW
InitializeCriticalSection
lstrcmpA
lstrlenA
SetLastError
LocalFree
GetStringTypeW
HeapAlloc
GetACP
lstrcatA
ReadFile
GetProcAddress
RaiseException
LoadResource
GetFullPathNameA
ExitProcess
GetLocaleInfoA
GetCommandLineA
WriteFile
ExitThread
GetLastError
FreeLibrary
LoadLibraryA
GlobalAlloc
GetStdHandle
CreateFileA
GetFileAttributesA
IsBadHugeReadPtr
GetStringTypeA
MulDiv
GlobalAddAtomA
VirtualAlloc
GetFileType
FindFirstFileA
GetCurrentProcessId
GetModuleHandleA
SetHandleCount
GetUserDefaultLCID
MoveFileExA
SetThreadLocale
GetProcessHeap
EnterCriticalSection
VirtualFree
VirtualQuery
CompareStringA
ResetEvent
SizeofResource
GlobalFindAtomA
GetCurrentProcess
LoadLibraryExA
SetErrorMode
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 512B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ