Static task
static1
Behavioral task
behavioral1
Sample
14ea7f6f0d98c21c92a6660043cb5b86_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14ea7f6f0d98c21c92a6660043cb5b86_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
14ea7f6f0d98c21c92a6660043cb5b86_JaffaCakes118
-
Size
96KB
-
MD5
14ea7f6f0d98c21c92a6660043cb5b86
-
SHA1
c34ebf4f11f8a8ee4f99ee5c278868ef410aab64
-
SHA256
73e337c00f9c31d256551a869f888bf58b204387b4171813fa39ed64ba6ced1e
-
SHA512
25d8956c7ce2ea7698d6c18892cbdb69d87d7caa338794892bdff4fe1c3e12b0159ad9d4f0ea3160ad389303a185deec61b6bd2403c95f2f879ec5f95d117b8b
-
SSDEEP
1536:BLivsLL7e0aJOvEDN8HdOGPNs7YV9EkgcItv6txf4jiVmiEQZUMsXKukPi+psIuC:BGvsv7e0FgurxQjiAipUMsXKukPi+ps
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14ea7f6f0d98c21c92a6660043cb5b86_JaffaCakes118
Files
-
14ea7f6f0d98c21c92a6660043cb5b86_JaffaCakes118.dll windows:4 windows x86 arch:x86
6786fd7affe9f179fd76308a5d6593a7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
FreeLibrary
lstrcmpiA
lstrcatA
lstrcmpA
WinExec
lstrlenA
GlobalAddAtomA
GlobalGetAtomNameA
GlobalFindAtomA
GetProcAddress
LocalLock
LocalUnlock
LocalFree
GlobalSize
GlobalDeleteAtom
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LoadLibraryA
GetDriveTypeA
OpenFile
CloseHandle
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetLocaleInfoW
VirtualProtect
LocalAlloc
GetCommandLineA
user32
IsWindow
GetClipboardData
EnumClipboardFormats
PeekMessageA
GetWindowThreadProcessId
IsClipboardFormatAvailable
RegisterClipboardFormatA
PackDDElParam
GetWindowLongA
DefWindowProcA
CreateWindowExA
SetWindowLongA
SendMessageA
KillTimer
LoadCursorW
RegisterClassW
CreateWindowExW
GetWindowLongW
SetWindowLongW
SendMessageW
DestroyIcon
DestroyWindow
PostMessageA
advapi32
OpenProcessToken
RegOpenKeyExA
RegQueryValueA
RegCloseKey
gdi32
GetEnhMetaFileHeader
SetEnhMetaFileBits
CopyEnhMetaFileA
GetDeviceCaps
StretchDIBits
RealizePalette
GetEnhMetaFileBits
DeleteEnhMetaFile
DeleteObject
GetObjectA
SelectPalette
GetStockObject
DeleteMetaFile
CreatePalette
GetBitmapBits
msvcrt
_cexit
_wcmdln
_initterm
_amsg_exit
exit
free
malloc
_adjust_fdiv
_except_handler3
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ