_Set@16
Static task
static1
Behavioral task
behavioral1
Sample
3eb1cff3bea54145478b99a2c351f515_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3eb1cff3bea54145478b99a2c351f515_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3eb1cff3bea54145478b99a2c351f515_JaffaCakes118
-
Size
100KB
-
MD5
3eb1cff3bea54145478b99a2c351f515
-
SHA1
0f2e0bd6122a02438668004a0022eb54b7d40b31
-
SHA256
f6704719b6b975d8e238d152d103537bf8c6acc47c98cab85f0d34b7649e2a14
-
SHA512
9bd109e36593eb91c0f8966e9a931f54f03ad43ae0b990a0790adc785012920213439af612134ac75b4727280598e99dfb4503994ca8032d17091e72c8fc1142
-
SSDEEP
768:/FvjWAz06r0h81GYP39r0uziePNPOFONsZBdv5QsPc8IgOkt4R:/d13Jrie1mFFBplPc8HOkCR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3eb1cff3bea54145478b99a2c351f515_JaffaCakes118
Files
-
3eb1cff3bea54145478b99a2c351f515_JaffaCakes118.dll windows:4 windows x86 arch:x86
ea163e02482d53e69f3aab17a960b7a0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
IsBadReadPtr
IsBadStringPtrA
UnmapViewOfFile
lstrlenA
MapViewOfFile
CreateFileMappingA
CloseHandle
OpenFileMappingA
WideCharToMultiByte
lstrlenW
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualProtect
CreateThread
GetTickCount
VirtualAlloc
VirtualFree
VirtualQuery
HeapCreate
GetSystemInfo
lstrcpyA
InterlockedIncrement
ExitProcess
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentThreadId
GetWindowsDirectoryA
GetLastError
lstrcatA
GetCommandLineA
OutputDebugStringA
OpenProcess
ReleaseMutex
CreateMutexA
Process32Next
TerminateProcess
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
GetCurrentProcess
Module32Next
Module32First
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
GetModuleHandleA
Sleep
GetCurrentProcessId
user32
wsprintfA
CallNextHookEx
PostThreadMessageA
UnhookWindowsHookEx
GetMessageA
SetWindowsHookExA
GetWindowThreadProcessId
EnumWindows
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shlwapi
PathFileExistsA
StrStrIA
StrStrW
StrStrA
msvcrt
_stricmp
_memicmp
_adjust_fdiv
_initterm
isprint
strrchr
atol
fopen
fseek
ftell
rewind
strstr
__CxxFrameHandler
isdigit
sscanf
sprintf
atoi
_itoa
isspace
isalnum
free
malloc
fgetc
Exports
Exports
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ