Static task
static1
Behavioral task
behavioral1
Sample
3ab1f98f62d6cdf31e857102617052eb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ab1f98f62d6cdf31e857102617052eb_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3ab1f98f62d6cdf31e857102617052eb_JaffaCakes118
-
Size
80KB
-
MD5
3ab1f98f62d6cdf31e857102617052eb
-
SHA1
48a04883fe1a014abdb86b53ec24fc44173388cf
-
SHA256
a87d709454a8d611e68b5eabf1e8530d7e0b608e731a80d5d6440828a777b6c5
-
SHA512
7353b922991cb74e484d82642e6762d94157843894a52c86a8a9b7b85eb9b03ecaa60955206884bd49afb975a0482704348b7490f1a6dba1d0bbbc491a1ef136
-
SSDEEP
1536:AROA9zM6oBCBLFmN/w9vGS3DYDkPYsfELko/471povIysARXGYYDiBgGEaG:taM6xB5g/wFBYsfELko/4775yJJGOgGa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ab1f98f62d6cdf31e857102617052eb_JaffaCakes118
Files
-
3ab1f98f62d6cdf31e857102617052eb_JaffaCakes118.dll windows:4 windows x86 arch:x86
e755a01e0900717ab1afe057b017bff1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLocaleInfoW
GetSystemTime
GetModuleHandleA
CreatePipe
TerminateThread
RtlUnwind
GetStdHandle
GetNumberFormatW
GetFileAttributesW
FreeEnvironmentStringsW
GetCurrentThreadId
DeviceIoControl
EnterCriticalSection
DuplicateHandle
InterlockedDecrement
LoadLibraryA
LeaveCriticalSection
GetVolumeNameForVolumeMountPointW
GetCommandLineW
GetFileSize
OutputDebugStringA
GetLastError
GetProcAddress
FormatMessageA
MapViewOfFileEx
VirtualAlloc
GetModuleFileNameA
GetVersionExW
ExitProcess
GlobalUnlock
GetTempPathW
CompareStringW
LeaveCriticalSection
CreateThread
GetModuleHandleW
FormatMessageW
FileTimeToLocalFileTime
_lclose
FindResourceW
SetEvent
LoadLibraryA
msvcrt
wcscmp
strcpy
__wgetmainargs
__p__fmode
memcpy
towupper
exit
__winitenv
strncpy
_wtol
__initenv
wcslen
toupper
fflush
user32
SetWindowPos
LoadIconA
SetTimer
DrawMenuBar
SetScrollPos
GetThreadDesktop
DrawTextW
LoadMenuW
RegisterClassExW
DefWindowProcA
DrawIcon
ModifyMenuW
ScreenToClient
PostMessageA
GetDlgItemTextA
FillRect
CharUpperW
LoadStringW
SetWindowTextW
SystemParametersInfoW
PtInRect
CloseClipboard
RedrawWindow
MapWindowPoints
EnableMenuItem
IsWindowVisible
IsRectEmpty
SendMessageA
OffsetRect
GetClipboardData
gdi32
PatBlt
SetMapMode
GetTextMetricsW
CreateCompatibleBitmap
GetStockObject
SelectObject
DeleteObject
SaveDC
CreatePen
GetObjectW
MoveToEx
BitBlt
SelectPalette
CreateCompatibleDC
CreatePalette
SetTextColor
opengl32
glTexCoord4iv
glRasterPos4dv
glGetBooleanv
glClearIndex
glMap1f
glPixelTransferi
glVertex3fv
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nlp0 Size: 1024B - Virtual size: 661B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nlp1 Size: 512B - Virtual size: 22B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nlp2 Size: 1024B - Virtual size: 793B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nlp3 Size: 512B - Virtual size: 69B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ