EcInit
Static task
static1
Behavioral task
behavioral1
Sample
13c6beb1f2869d57d782b735297a198d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13c6beb1f2869d57d782b735297a198d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
13c6beb1f2869d57d782b735297a198d_JaffaCakes118
-
Size
3.9MB
-
MD5
13c6beb1f2869d57d782b735297a198d
-
SHA1
2a8e1475ef5ac141488b7da0633f4f9731de76f8
-
SHA256
61b986372ace0b53edc714f3860930bca051012cc7a14b5b608b18b0fab7db32
-
SHA512
b60709be84a19573c0cf7915e9d8bae0b01d2148911cb045d915f40f646e7340ab135fdd36c0ece68cb680933d088f127ae89f6f78629150bc1574757dabef46
-
SSDEEP
24576:hF9kN/Ht8/wcLX069yOxnepxCPG4+py7v/FNk7xW:haNoLX06jepQPG4Hrc4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13c6beb1f2869d57d782b735297a198d_JaffaCakes118
Files
-
13c6beb1f2869d57d782b735297a198d_JaffaCakes118.dll windows:4 windows x86 arch:x86
3a0c29b40b05e5fe2fc02d76c9a495f4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
comctl32
InitCommonControls
comdlg32
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
dsound
DirectSoundCreate
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreateSolidBrush
DeleteObject
GetDIBits
SelectObject
SetBkColor
SetBkMode
SetTextColor
kernel32
CloseHandle
CreateDirectoryA
CreateFileA
CreateFileMappingA
CreateThread
DeleteFileA
EnterCriticalSection
ExitProcess
ExitThread
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetFileSize
GetModuleFileNameA
GetPrivateProfileStringA
GetProcessHeap
GetTickCount
GetTimeFormatA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MapViewOfFile
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
ReadProcessMemory
RtlZeroMemory
SetFilePointer
Sleep
TerminateThread
TlsAlloc
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualProtect
WriteFile
WritePrivateProfileStringA
WriteProcessMemory
lstrcat
lstrcmp
lstrcmpi
lstrcpy
lstrcpyn
lstrlen
shell32
DragQueryFile
user32
CloseClipboard
CreateWindowExA
DestroyWindow
DlgDirListA
EmptyClipboard
EnableWindow
FindWindowExA
FlashWindowEx
GetAsyncKeyState
GetClientRect
GetClipboardData
GetDlgItem
GetForegroundWindow
GetWindowDC
GetWindowPlacement
GetWindowRect
GetWindowThreadProcessId
InvalidateRect
IsIconic
IsWindow
LoadCursorA
LoadIconA
MessageBeep
MessageBoxA
MoveWindow
OpenClipboard
PostQuitMessage
RegisterHotKey
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetClipboardData
SetFocus
SetScrollInfo
SetWindowPos
SetWindowTextA
ShowWindow
UnregisterHotKey
wsprintfA
winmm
mmioAscend
mmioClose
mmioDescend
mmioOpenA
mmioRead
ws2_32
WSACleanup
WSAStartup
accept
bind
closesocket
connect
gethostbyname
getpeername
getsockname
htons
inet_addr
inet_ntoa
listen
recv
send
shutdown
socket
Exports
Exports
Sections
.text Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text1 Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data1 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc1 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.pdata Size: 512KB - Virtual size: 512KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.codefuc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE