Static task
static1
Behavioral task
behavioral1
Sample
0fef7cb5867d56f44c1118c15d22078c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0fef7cb5867d56f44c1118c15d22078c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0fef7cb5867d56f44c1118c15d22078c_JaffaCakes118
-
Size
233KB
-
MD5
0fef7cb5867d56f44c1118c15d22078c
-
SHA1
0c3b4c1b9d7ce61f68f4c4358a5bbd932c88db82
-
SHA256
dcef24feb1e7b88719b7f4a17645ee839b67208c1db823e8dfd779a74dfb316e
-
SHA512
944abdfb98c8cbd456557eb14e6217d7ae5314cd6ac4ae45177a7e950152bd82022b1a66d974fc39c96ca1f6dbd1f847244c744a13f3987a0cf5030aa241a4d0
-
SSDEEP
6144:AX3/gc14bnDLiqx4HYkwoqjEgCCdGMUvvbC5oL:AX3/d14bnDeq0Y9VEgFd2nbC5oL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fef7cb5867d56f44c1118c15d22078c_JaffaCakes118
Files
-
0fef7cb5867d56f44c1118c15d22078c_JaffaCakes118.dll windows:4 windows x86 arch:x86
5f43adca85b2d6bfe736cf146748e6f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetDiskFreeSpaceA
Sleep
lstrlenW
FindClose
GetSystemDefaultLangID
GetModuleHandleA
GetOEMCP
GetACP
VirtualQuery
GetCurrentThread
SetThreadLocale
IsBadReadPtr
GetStartupInfoA
LocalReAlloc
SetErrorMode
WideCharToMultiByte
HeapDestroy
WaitForSingleObject
GetProcAddress
WriteFile
ExitThread
LoadLibraryA
SizeofResource
GetStringTypeW
GetCommandLineA
EnterCriticalSection
ExitProcess
GetProcessHeap
GetCurrentThreadId
GetCommandLineW
DeleteFileA
LocalAlloc
lstrlenA
FindResourceA
GetVersionExA
GetModuleHandleW
GlobalFindAtomA
lstrcmpA
GetLastError
CreateThread
GetFileSize
VirtualAllocEx
GlobalDeleteAtom
IsBadHugeReadPtr
GlobalAddAtomA
GetTickCount
RaiseException
SetEvent
GetStringTypeA
GetLocaleInfoA
LockResource
SetLastError
GetUserDefaultLCID
EnumCalendarInfoA
HeapAlloc
lstrcatA
GetModuleFileNameA
ResetEvent
LoadLibraryExA
lstrcpynA
FormatMessageA
GlobalAlloc
shell32
Shell_NotifyIconA
SHFileOperationA
SHGetFileInfoA
SHGetDiskFreeSpaceA
DragQueryFileA
oleaut32
SysFreeString
SafeArrayCreate
shlwapi
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
SHDeleteValueA
SHQueryValueExA
PathFileExistsA
SHStrDupA
msvcrt
atol
sin
memset
sqrt
fabs
user32
TrackPopupMenu
SetForegroundWindow
SetTimer
SetWindowLongA
SetParent
SetWindowsHookExA
SetClipboardData
SetCapture
ShowScrollBar
SetScrollRange
SetPropA
SetWindowPlacement
TranslateMessage
TranslateMDISysAccel
SetMenu
SetWindowPos
SetClassLongA
SetScrollInfo
SystemParametersInfoA
SetRect
SetMenuItemInfoA
SetCursor
SetWindowLongW
SetFocus
ShowWindow
SetWindowTextA
UnregisterClassA
SetScrollPos
ShowOwnedPopups
UnhookWindowsHookEx
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 512B - Virtual size: 298B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adata Size: 162KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ddata Size: 1024B - Virtual size: 853B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ