Initialize
Static task
static1
Behavioral task
behavioral1
Sample
3e71808354249c3f3c1f5cf2dd98d352_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3e71808354249c3f3c1f5cf2dd98d352_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3e71808354249c3f3c1f5cf2dd98d352_JaffaCakes118
-
Size
361KB
-
MD5
3e71808354249c3f3c1f5cf2dd98d352
-
SHA1
b5447c98507193281c1143335b5b164cb6c837ef
-
SHA256
ae727217b3d8cb9f878c77430b7cf709705c18f5382cfff6a8484f5872430ed7
-
SHA512
2a66eeccec659e3567a00a1ee61a9aab632910ee660d7fc68405528c13b909194eae8fe6aa2381132da0728ad247e58d5d1e825f75aa720d4db6b4f19aef34a7
-
SSDEEP
6144:9Qioss7G9yFRBtYc576OWujUVF1u1tdnleqZAAv+Y2Fs:qis7dO9uYUle9YZIs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e71808354249c3f3c1f5cf2dd98d352_JaffaCakes118
Files
-
3e71808354249c3f3c1f5cf2dd98d352_JaffaCakes118.dll windows:4 windows x86 arch:x86
28b4bf51640639371eb7a3e8e20368a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
WriteProcessMemory
GetCurrentProcess
CloseHandle
ReadFile
GetLastError
CreateFileA
HeapFree
HeapAlloc
GetProcessHeap
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetStdHandle
VirtualProtect
GetFullPathNameA
GetModuleFileNameA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCurrentDirectoryA
ExitProcess
CreateMutexA
GetModuleHandleA
GetCurrentProcessId
SetEndOfFile
GetLocaleInfoW
CreateFileW
WriteConsoleW
GetConsoleOutputCP
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
RaiseException
RtlUnwind
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
LCMapStringA
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
SetHandleCount
GetStartupInfoA
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
WriteConsoleA
user32
ShowWindow
MessageBoxA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Exports
Exports
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
epnrwurr Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xv2se9a4 Size: 88KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
22ieplgw Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ