CPlApplet
Static task
static1
Behavioral task
behavioral1
Sample
0f94308ed6a8d3b1519c931b088e1c77_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0f94308ed6a8d3b1519c931b088e1c77_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0f94308ed6a8d3b1519c931b088e1c77_JaffaCakes118
-
Size
80KB
-
MD5
0f94308ed6a8d3b1519c931b088e1c77
-
SHA1
1c9889d906d95290ec9cf0dfec9c32994ee1cfcd
-
SHA256
06d4c49a1229894bec29901de5e4f163fa7d0224dcaef5edce6365f378989ae7
-
SHA512
1f4b6f9df05cd81338e9f65e4a6b160503694c768a2d48bb0860bc306fe92f502fab312fd951e7b7b6f961e1be74f65735c64c8fcc21f9bffe8d7dafa7159d0c
-
SSDEEP
1536:qqlzKB1upg4Qrgv3lnkSHbvmWd10I0+IS:qkzKUg4Qruqod0+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f94308ed6a8d3b1519c931b088e1c77_JaffaCakes118
Files
-
0f94308ed6a8d3b1519c931b088e1c77_JaffaCakes118.dll windows:4 windows x86 arch:x86
2e2f8f5fc004f9ed946937588b84f205
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
OpenEventA
UnmapViewOfFile
GetTickCount
GetProcAddress
CreateDirectoryA
GetComputerNameA
CloseHandle
Sleep
HeapAlloc
InterlockedCompareExchange
GetModuleHandleA
ExitProcess
InterlockedExchange
SetLastError
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
SetEvent
GetProcessHeap
GlobalAlloc
LeaveCriticalSection
LocalFree
VirtualQuery
HeapFree
DosDateTimeToFileTime
GetDriveTypeW
SetHandleInformation
GetOverlappedResult
InterlockedExchangeAdd
SetEndOfFile
WriteConsoleInputA
DeleteTimerQueueEx
InitializeCriticalSection
PurgeComm
FreeResource
CreateJobObjectW
CreateMailslotA
SetVolumeLabelW
FindNextVolumeW
FreeEnvironmentStringsW
VerSetConditionMask
SetupComm
GetDefaultCommConfigW
IsBadWritePtr
CreateMailslotW
GetBinaryTypeW
EnumSystemLocalesA
GetQueuedCompletionStatus
GetFileInformationByHandle
GetVolumeInformationW
GetStringTypeA
lstrcpyW
SystemTimeToTzSpecificLocalTime
DisconnectNamedPipe
BackupRead
AddAtomA
IsBadReadPtr
PeekConsoleInputW
OpenProcess
FindNextFileA
GlobalReAlloc
MapViewOfFileEx
ReadConsoleW
DeleteFileW
GetCommProperties
EnumUILanguagesW
CreateMutexW
SetLocalTime
CreateThread
RegisterWaitForSingleObjectEx
ReadProcessMemory
GetCommState
GetCommConfig
lstrcatW
EnumResourceNamesW
ActivateActCtx
AddAtomW
lstrcpynW
ReadConsoleInputW
GetThreadLocale
CancelWaitableTimer
GetProfileSectionA
GetDiskFreeSpaceW
SetVolumeLabelA
lstrlenW
ole32
StgIsStorageFile
CoTaskMemRealloc
CreateFileMoniker
GetRunningObjectTable
CoFileTimeNow
OleInitialize
OleCreateFromData
CoUnmarshalInterface
OleCreateMenuDescriptor
RevokeDragDrop
OleCreateLink
CoGetClassObject
OleSaveToStream
OleRegEnumVerbs
FreePropVariantArray
StringFromIID
CoCreateInstanceEx
OleCreateFromFile
CoInitialize
oleaut32
SysAllocStringLen
SysReAllocStringLen
shlwapi
StrCatBuffW
StrCmpIW
SHDeleteKeyW
PathAppendW
StrCmpW
PathRemoveFileSpecW
PathFindExtensionW
StrCatBuffA
AssocCreate
StrStrIW
UrlUnescapeW
PathGetCharTypeA
PathIsFileSpecW
UrlEscapeW
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ