Static task
static1
Behavioral task
behavioral1
Sample
16417691f0f1c7022ca7b19468d017ef_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16417691f0f1c7022ca7b19468d017ef_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
16417691f0f1c7022ca7b19468d017ef_JaffaCakes118
-
Size
250KB
-
MD5
16417691f0f1c7022ca7b19468d017ef
-
SHA1
80d9ceb18b5e34b9877b54c0cd8ba555f0343d6d
-
SHA256
7ab82f08cc5c7154d9054b5f35cb9dca4383944618e1dd3870471f984cbf4b4e
-
SHA512
666cd515a9ef1d9344dcd788385f3cf02d5b965e47e4da71f9b691cc65c3a95c68589abc68f395c2052caa628831ecef709d6dc3de7bbd4745b6b74063369e3d
-
SSDEEP
6144:IsOLCMq2Ex1LGjcHfmec2ZjRB4VFYKAvb/Yn:IspIqBpHfmefRuVeU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16417691f0f1c7022ca7b19468d017ef_JaffaCakes118
Files
-
16417691f0f1c7022ca7b19468d017ef_JaffaCakes118.dll windows:4 windows x86 arch:x86
6f5b837b646e95bb85fce407952b8858
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LocalFree
FormatMessageW
GetPrivateProfileStringW
GetVersion
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExW
WaitForSingleObject
OutputDebugStringW
GetPrivateProfileIntW
WritePrivateProfileStructW
WritePrivateProfileStringW
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
CloseHandle
GetModuleFileNameW
GetCurrentProcess
GetLastError
GlobalAlloc
GlobalFree
FlushFileBuffers
SetStdHandle
GetPrivateProfileStructW
GetStartupInfoW
SetFilePointer
GetCPInfo
LoadLibraryA
IsBadWritePtr
SetUnhandledExceptionFilter
HeapSize
HeapReAlloc
LCMapStringW
WideCharToMultiByte
GetModuleHandleA
GetOEMCP
GetVersionExA
ExitProcess
RtlUnwind
RaiseException
HeapAlloc
GetProcAddress
TerminateProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
shlwapi
PathFileExistsW
PathAddBackslashW
PathRemoveFileSpecW
PathRemoveBackslashW
Sections
.text Size: 215KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 472KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ