Static task
static1
Behavioral task
behavioral1
Sample
17126c9e2d8a68d3a2a3a7a0f875fd42_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17126c9e2d8a68d3a2a3a7a0f875fd42_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
17126c9e2d8a68d3a2a3a7a0f875fd42_JaffaCakes118
-
Size
237KB
-
MD5
17126c9e2d8a68d3a2a3a7a0f875fd42
-
SHA1
956a6854e3ca3d85387cb35f088e71ea59384490
-
SHA256
1debba0eea353b16425a5f36f5201af05dd9304950d6cf9104516e78d6f8876d
-
SHA512
fbc565379f641e0a3480291bc0c77c2f6505b7746afa0b43164f6b786b8b44d3a4b4d10ffb40d3c649502be79f4131ad306fe1ca0335ed2bdb21bfee37b42049
-
SSDEEP
3072:fhv+G0K/6nyCkdEt7bvaUOAfYVLaTh/NRY48+iya7RPCkxSeZ3XPEQNkaS:f1AyCkdEt7bvaUd+LSX+yaN6kRZPEZa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17126c9e2d8a68d3a2a3a7a0f875fd42_JaffaCakes118
Files
-
17126c9e2d8a68d3a2a3a7a0f875fd42_JaffaCakes118.dll windows:4 windows x86 arch:x86
7dbff0788f942392fae78a5a58158aed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
shell32
SHGetDesktopFolder
Shell_NotifyIconA
DragQueryFileA
SHGetSpecialFolderLocation
SHGetFolderPathA
user32
LoadStringA
SendMessageW
InsertMenuA
SetClipboardData
GetParent
GetWindowDC
kernel32
VirtualAllocEx
LoadLibraryA
ExitProcess
LocalAlloc
GetProcAddress
IsBadReadPtr
VirtualAlloc
GetVersionExA
ExitThread
LoadLibraryExA
GetModuleHandleW
GetCommandLineW
GetModuleHandleA
lstrlenA
shlwapi
SHQueryInfoKeyA
SHEnumValueA
PathIsDirectoryA
SHDeleteValueA
PathIsContentTypeA
SHStrDupA
SHGetValueA
SHDeleteKeyA
PathGetCharTypeA
PathFileExistsA
version
VerInstallFileA
msvcrt
sqrt
time
wcsncmp
swprintf
atan
memcpy
tolower
comctl32
ImageList_Read
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Write
ImageList_Draw
ImageList_DrawEx
ImageList_Add
ImageList_Destroy
ImageList_DragShowNolock
ole32
CreateStreamOnHGlobal
CoCreateFreeThreadedMarshaler
advapi32
RegLoadKeyA
RegDeleteValueA
RegEnumKeyA
GetUserNameA
RegDeleteValueA
RegEnumKeyA
comdlg32
FindTextA
gdi32
CreateBrushIndirect
SetPixel
GetRgnBox
BitBlt
SetTextColor
GetDIBits
GetPaletteEntries
CreatePalette
CreatePenIndirect
LineTo
GetObjectA
GetDIBColorTable
GetPixel
CreateDIBitmap
GetDIBits
CreateDIBSection
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 1024B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ