install
Static task
static1
Behavioral task
behavioral1
Sample
2a6b2801f7a08c04669ec0562f07ae8a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a6b2801f7a08c04669ec0562f07ae8a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2a6b2801f7a08c04669ec0562f07ae8a_JaffaCakes118
-
Size
84KB
-
MD5
2a6b2801f7a08c04669ec0562f07ae8a
-
SHA1
425fa6a22dd870e658f2c712aa15ea513960c119
-
SHA256
6366f328f1a4ad784b87f261ce398ab23201788d0f95b0891c01c79ca6061673
-
SHA512
0146d1a9023e28f627244e402440482e9b811619ef6ca4abc05489b308d3a6693bae535820becfc762840718bc718a08cc5b70058e0e327422a02987a546a955
-
SSDEEP
1536:j4VK7rRhY/6nIMT2YxCgtNUBYLscvkrOC5TNgfSzP+vtMJ7MDr:j4KW/6nZxJtNUBcvkrBSvty7Mf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a6b2801f7a08c04669ec0562f07ae8a_JaffaCakes118
Files
-
2a6b2801f7a08c04669ec0562f07ae8a_JaffaCakes118.dll windows:4 windows x86 arch:x86
feb11f6bed4b7250c614ea51c779b20e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
HeapAlloc
HeapCreate
InitializeCriticalSection
HeapDestroy
GetSystemInfo
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
SearchPathA
GetVersionExA
lstrcpynA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
OutputDebugStringA
SetEnvironmentVariableA
GetEnvironmentVariableA
DebugBreak
CreateDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemTime
WinExec
lstrcmpA
FindClose
FindNextFileA
FindFirstFileA
HeapReAlloc
HeapFree
GetSystemDirectoryA
GetModuleFileNameA
MoveFileA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcmpiA
DeleteFileA
lstrlenA
GetFileSize
MoveFileExA
CopyFileA
CloseHandle
WriteFile
ReadFile
InterlockedIncrement
CreateFileA
InterlockedDecrement
lstrcatA
GetSystemDefaultLangID
lstrcpyA
SetCurrentDirectoryA
GetPrivateProfileSectionA
GetLastError
user32
MapWindowPoints
SetWindowPos
ShowWindow
GetClientRect
GetWindow
LoadImageA
GetSystemMetrics
SystemParametersInfoA
EndDialog
ExitWindowsEx
wsprintfA
MessageBoxA
GetDlgItem
GetParent
SetPropA
SetWindowTextA
GetCapture
GetWindowLongA
InvalidateRect
SetCapture
GetWindowRect
ClientToScreen
PtInRect
ReleaseCapture
LoadCursorA
SetCursor
GetPropA
CallWindowProcA
RemovePropA
CharLowerA
SetWindowLongA
PostMessageA
DialogBoxParamA
wvsprintfA
SetDlgItemTextA
CharNextA
LoadStringA
SendMessageA
GetActiveWindow
FindWindowA
gdi32
GetObjectA
CreateFontIndirectA
DeleteObject
SetTextColor
advapi32
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
GetUserNameA
RegQueryValueExA
RegEnumKeyExA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyA
RegQueryInfoKeyA
RegFlushKey
FreeSid
RegEnumValueA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
ole32
OleInitialize
OleUninitialize
shlwapi
SHDeleteKeyA
StrToIntA
SHDeleteValueA
setupapi
SetupIterateCabinetA
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ