Static task
static1
Behavioral task
behavioral1
Sample
2fd3a3dd7508de3bc059b9da62e2c997_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2fd3a3dd7508de3bc059b9da62e2c997_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2fd3a3dd7508de3bc059b9da62e2c997_JaffaCakes118
-
Size
32KB
-
MD5
2fd3a3dd7508de3bc059b9da62e2c997
-
SHA1
a3ddbd499f217a6cd1d0d2c32a35d3d8c858fa8e
-
SHA256
e838e9dceb67050a1907ce66b5567ff90011db701814bd752751ececed6d803b
-
SHA512
b42da41b922382064f9acbefb939031c2d4c228448bd359b41b082949c462cf47b19cb01799dc01505befb6c4fa9df177d64fed8d8e13e15fc176639983261a2
-
SSDEEP
768:fI2C4FpWRXKhGXLWI1l+UsyYIXgJSCnhF:zC4P+X2WjyIXgoCn7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fd3a3dd7508de3bc059b9da62e2c997_JaffaCakes118
Files
-
2fd3a3dd7508de3bc059b9da62e2c997_JaffaCakes118.dll windows:4 windows x86 arch:x86
07aeec4a5798b12c7fe77945e4e974e7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_adjust_fdiv
_initterm
malloc
_strdup
free
ntdll
NtQueryInformationProcess
NtSetInformationProcess
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
FlushInstructionCache
Sleep
GetTickCount
QueryPerformanceCounter
RtlUnwind
CreateThread
FindClose
FindFirstFileA
GetVolumeInformationA
GetSystemDirectoryA
GetCommandLineA
VirtualProtect
IsBadReadPtr
GetProcAddress
GetModuleHandleA
VirtualFree
LoadLibraryA
VirtualAlloc
GetVersion
VerifyVersionInfoA
VerSetConditionMask
GetCurrentProcess
ExitThread
CloseHandle
ExitProcess
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ