Static task
static1
Behavioral task
behavioral1
Sample
371144baf039cd343d133ff7e99eb356_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
371144baf039cd343d133ff7e99eb356_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
371144baf039cd343d133ff7e99eb356_JaffaCakes118
-
Size
303KB
-
MD5
371144baf039cd343d133ff7e99eb356
-
SHA1
3c0a116518be7c9dd8f94fdb8b09676909a2d50c
-
SHA256
0a3d6baf55f3513b2bb7631a5151fa4122d8f999a801c38a4cc288a62c4fe7dc
-
SHA512
a1ecb26c6cde8e75c19825faca546e59398ed9ea51bc8304140070839c97c2a4b04f9b14da09ffc6a8c87d3582c624a2387ae44d76b7b70f7a3f213e02f0feab
-
SSDEEP
6144:Bp7kY/ynnjcZUEeZF1GHPAVZ7SPhl5HZxuVH6APr2Su977IrgYG0Qw0+Jz+BS:Bp7kY/yn4ZUNZFwHyZWtZoVH6Fb7crg4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 371144baf039cd343d133ff7e99eb356_JaffaCakes118
Files
-
371144baf039cd343d133ff7e99eb356_JaffaCakes118.dll windows:4 windows x86 arch:x86
14e5230dafc61f0ffdbb4b6f8e75c700
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
GetACP
LoadLibraryA
HeapAlloc
GetStdHandle
VirtualAlloc
LoadLibraryExA
GlobalAlloc
GetProcAddress
GetOEMCP
GetLocaleInfoA
GlobalAddAtomA
GetModuleHandleA
GetProcessHeap
GetModuleFileNameA
LockResource
GetLocalTime
GetThreadLocale
GetVersionExA
lstrlenA
GlobalDeleteAtom
GetTickCount
RaiseException
GetSystemDefaultLangID
LocalAlloc
GetCommandLineW
GetVersion
HeapFree
GetStartupInfoA
LoadResource
GetUserDefaultLCID
VirtualAllocEx
GetStringTypeA
GetStringTypeW
ExitProcess
InitializeCriticalSection
ExitThread
GlobalFindAtomA
advapi32
RegEnumKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
gdi32
CreateCompatibleBitmap
SetBkColor
SelectPalette
CreateDIBSection
CreatePenIndirect
CreateBitmap
SetTextColor
SetPixel
GetDCOrgEx
LineTo
SaveDC
GetPaletteEntries
RestoreDC
SetBkMode
GetRgnBox
CreateDIBitmap
CreatePalette
GetCurrentPositionEx
BitBlt
CreateCompatibleDC
GetObjectA
GetClipBox
GetDIBColorTable
CopyEnhMetaFileA
GetBitmapBits
GetPixel
CreateFontIndirectA
CreateBrushIndirect
SelectObject
GetDIBits
shlwapi
PathIsDirectoryA
PathGetCharTypeA
SHQueryInfoKeyA
SHDeleteValueA
SHEnumValueA
comctl32
ImageList_DragShowNolock
ImageList_Read
ImageList_Remove
ImageList_Destroy
user32
GetCursor
GetDlgItem
EnableScrollBar
DrawIconEx
GetClassInfoA
EndPaint
GetClientRect
EnumWindows
DrawMenuBar
GetDC
GetActiveWindow
GetClassNameA
GetClipboardData
GetCursorPos
GetFocus
GetDCEx
FindWindowA
GetClassLongA
GetDesktopWindow
GetCapture
EqualRect
DrawTextA
EnableWindow
EnumChildWindows
EnableMenuItem
EnumThreadWindows
EmptyClipboard
GetForegroundWindow
FrameRect
FillRect
oleaut32
SafeArrayUnaccessData
GetErrorInfo
VariantCopyInd
SysAllocStringLen
SafeArrayGetElement
SysStringLen
Sections
CODE Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 817B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc6 Size: 173KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 512B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc1 Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc5 Size: 1024B - Virtual size: 763B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc2 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ