Static task
static1
Behavioral task
behavioral1
Sample
0e86891bce46f469620a42843e528020_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e86891bce46f469620a42843e528020_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0e86891bce46f469620a42843e528020_JaffaCakes118
-
Size
63KB
-
MD5
0e86891bce46f469620a42843e528020
-
SHA1
df891253c1747566507db5ef4b09d0bc9e9942da
-
SHA256
01e588f3d98f11000549bfd5e2a9ae546509336974144a77af73c4eb89856f0c
-
SHA512
0c0efbb3b8aa958b0bb0abed046d4e146c2cbf3521c0b4d7d8a0043aa12b67ce12075d349d82243d37a4ffe52207a107c5c75be4f2c12ddd3631c080bf7aeb46
-
SSDEEP
384:ZybpcBUk9PeyxBGwrQrnlln9Z4NDm5W1V5g+oT2BwaL9jskTQ6r+L9jskTQ6rBp:stcBZPfB/ralp4513u23skTQ6QskTQ6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e86891bce46f469620a42843e528020_JaffaCakes118
Files
-
0e86891bce46f469620a42843e528020_JaffaCakes118.dll windows:4 windows x86 arch:x86
4d46600479b690a5ed6b18628e374bc9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetACP
CreateFileA
VirtualAlloc
GetOEMCP
GetCurrentProcess
GetCommandLineA
lstrlenW
GetCommandLineW
HeapAlloc
HeapFree
GetProcessHeap
GetProcAddress
SearchPathW
FindResourceW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetVersionExW
GetLocaleInfoW
CreateFileMappingW
LoadLibraryExW
FindResourceExW
LoadResource
SetLastError
CreateFileW
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetPrivateProfileIntW
GetPrivateProfileIntA
GetPrivateProfileStringW
GetPrivateProfileStringA
GetFullPathNameW
GetFullPathNameA
GetLocaleInfoA
LoadLibraryExA
GetUserDefaultLCID
LoadLibraryW
GetUserDefaultLangID
HeapReAlloc
user32
LoadCursorW
LoadCursorA
advapi32
RegOpenKeyA
RegQueryValueExA
Sections
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggg2 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata5 Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggg7 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
ggg6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
ggg5 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
ggg4 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
ggg3 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.text9 Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ