Static task
static1
Behavioral task
behavioral1
Sample
1566a2346898408660cf95758ff7b0b5_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1566a2346898408660cf95758ff7b0b5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1566a2346898408660cf95758ff7b0b5_JaffaCakes118
-
Size
133KB
-
MD5
1566a2346898408660cf95758ff7b0b5
-
SHA1
c2c0839a50b22e70452f9bb7f9dcaa07c53c2607
-
SHA256
7594932a52d3a2f93bba8c7693288acfc31cf39f92eb8507fb4e2ae2435ac07e
-
SHA512
72104788a490960fbd61bf7a1f0f099f2fe54f9fc530ad68d2c72429b0b695b58379bcdb84df40f3d3dc9c190cc8e62aca2ab47c4f2d9145413b382f720866e5
-
SSDEEP
3072:gQknHMdiOSKmEYalq3iwZQ55Tqj/F/hEbqcYGzcfxhxrx+:wnssOSKmELluiwZmy/FSqcYQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1566a2346898408660cf95758ff7b0b5_JaffaCakes118
Files
-
1566a2346898408660cf95758ff7b0b5_JaffaCakes118.dll windows:4 windows x86 arch:x86
51f7fb1d4813a3d64b7d6c2de77d9bb7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
GetProcessHeap
HeapAlloc
InterlockedIncrement
GetComputerNameW
InterlockedDecrement
DeviceIoControl
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
LocalReAlloc
InitializeCriticalSection
CompareFileTime
SetEvent
GetSystemTimeAsFileTime
CreateEventW
GetModuleFileNameW
IsBadReadPtr
ReadFileEx
GetModuleHandleA
MulDiv
WaitForMultipleObjects
ResetEvent
GetModuleHandleW
CreateFileMappingW
MapViewOfFile
VirtualQuery
Sleep
DisableThreadLibraryCalls
CreateMutexW
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetLastError
CreateMailslotW
CreateFileW
WriteFile
ReadFile
CreateThread
InterlockedCompareExchange
InterlockedExchange
CloseHandle
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
lstrlenW
lstrlenA
LocalAlloc
LocalFree
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
FreeResource
ReleaseMutex
TlsSetValue
TlsGetValue
GetCurrentThreadId
WaitForSingleObject
GetVersion
GetCommandLineA
GetTickCount
GetCurrentProcessId
VirtualProtect
user32
MapWindowPoints
GetWindowRect
SetFocus
GetPropW
CallWindowProcW
RemovePropW
GetWindowLongW
SendMessageW
SetPropW
GetSystemMetrics
ClientToScreen
SendDlgItemMessageW
GetDC
GetDlgItem
SetWindowLongW
DestroyIcon
GetUpdateRect
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
CheckDlgButton
wsprintfW
PostMessageW
SetWindowPos
SetWindowTextW
ShowWindow
EnableWindow
GetSysColorBrush
CheckRadioButton
InvalidateRect
ReleaseDC
GetClientRect
EndDialog
SetCursor
LoadCursorW
GetFocus
FillRect
GetSysColor
LoadStringW
InflateRect
LoadImageW
GetParent
advapi32
RegOpenKeyExA
RegQueryValueExA
CheckTokenMembership
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyW
CloseServiceHandle
gdi32
DeleteObject
GetTextExtentPointW
TextOutW
DeleteDC
IntersectClipRect
SetBkColor
SetTextAlign
SetTextColor
MoveToEx
SetDIBitsToDevice
GetBitmapBits
GetObjectW
SetStretchBltMode
BitBlt
Polyline
GetStockObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
SetBkMode
StretchDIBits
ole32
CoUninitialize
CoInitialize
rpcrt4
RpcStringFreeW
NdrClientCall2
RpcSmDestroyClientContext
RpcBindingFree
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcMgmtSetComTimeout
RpcEpResolveBinding
RpcBindingSetAuthInfoExW
RpcMgmtInqServerPrincNameW
msvcrt
__CxxFrameHandler
_except_handler3
qsort
memset
_vsnwprintf
memcpy
rand
_adjust_fdiv
_wcsdup
wcstok
free
_wcsicmp
wcschr
srand
_amsg_exit
_initterm
_XcptFilter
memmove
malloc
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ