Static task
static1
Behavioral task
behavioral1
Sample
270446a34e41658d98a0ba4f69319142_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
270446a34e41658d98a0ba4f69319142_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
270446a34e41658d98a0ba4f69319142_JaffaCakes118
-
Size
731KB
-
MD5
270446a34e41658d98a0ba4f69319142
-
SHA1
c91a1a1d26f114bcad24b72620406aacd03aa524
-
SHA256
6e159fa8039968ee53f43834b3e765d26f3e43fc4ae803bff1c2753c29b7a481
-
SHA512
0890be8a0c534bab3c9c726d6fa487102da7d4251e3cf8ff95999a9e889c8b227f57a4ccf1041814ceae99cd309584b1fd927ae3e2a9644ad98d9f2a4a3da47d
-
SSDEEP
12288:7IUYsValv1cMyvQZRez6J888888888888888u:msVA/6QZRK6J888888888888888u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 270446a34e41658d98a0ba4f69319142_JaffaCakes118
Files
-
270446a34e41658d98a0ba4f69319142_JaffaCakes118.dll windows:4 windows x86 arch:x86
baa93d47220682c04d92f7797d9224ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 89KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 940B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 800KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vtwxbrut Size: 635KB - Virtual size: 636KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uwhoahar Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE