MsgProc
Static task
static1
Behavioral task
behavioral1
Sample
38e93892e6bae99036511ce8f9d83dbc_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
38e93892e6bae99036511ce8f9d83dbc_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
38e93892e6bae99036511ce8f9d83dbc_JaffaCakes118
-
Size
172KB
-
MD5
38e93892e6bae99036511ce8f9d83dbc
-
SHA1
999bb07c91ee491d74ba07c19713cbfbd86924d3
-
SHA256
adfe048738b381547a836d060ce4a4deddd4617ef843807498f5b6db98ce9f7b
-
SHA512
2431f0b9cab9af97d16e66afec096a4278312e1f8890bc17e9ea895a1f36e82850aef2371f54b7a223c1faf07b2758d3934945d1b411d1c60acb1c67deef5a15
-
SSDEEP
3072:ZqBnqLBP7XmecjWoYq5Yy3tLaU3ei6BphaXWQLRBLF:ZDJ7Xmvey3tLaU3DeKWQLrF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38e93892e6bae99036511ce8f9d83dbc_JaffaCakes118
Files
-
38e93892e6bae99036511ce8f9d83dbc_JaffaCakes118.dll windows:4 windows x86 arch:x86
406c846b7a5b702ab31168076efc2032
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentProcessId
GetWindowsDirectoryA
GetSystemDirectoryA
lstrcatA
CreateMutexA
CreateMutexW
OutputDebugStringA
CloseHandle
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetLastError
VirtualProtect
FlushInstructionCache
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RtlUnwind
GetCommandLineA
GetVersion
HeapAlloc
WideCharToMultiByte
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetLastError
HeapFree
ExitProcess
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
SetStdHandle
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
RaiseException
FlushFileBuffers
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CallNextHookEx
netapi32
Netbios
shlwapi
PathFileExistsA
Exports
Exports
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bzd0 Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bzd1 Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.bzd2 Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ