Static task
static1
Behavioral task
behavioral1
Sample
401e6703b59b881eb4eb8972d3892fb0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
401e6703b59b881eb4eb8972d3892fb0_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
401e6703b59b881eb4eb8972d3892fb0_JaffaCakes118
-
Size
233KB
-
MD5
401e6703b59b881eb4eb8972d3892fb0
-
SHA1
ee4ea172e171a6915e49386d7d386da70ff4337f
-
SHA256
6123f3a134d9b480641cad72a472a2c39f9768f28e3bfed8dbd605e94f598f98
-
SHA512
093cbffc076502ce540696c72095125f2ca8b7471602c388b2616444dd71197601533cbbbf5214f16d910d67e00d89f63291cb991dda6fb699c83a9f4b89fb9b
-
SSDEEP
3072:YDTDTDaQNA2DmwtFA5Lf87RSLcQnExb5R0vR5IQ/7t15:YXXNvtFAZf8zQE3S5t7t15
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 401e6703b59b881eb4eb8972d3892fb0_JaffaCakes118
Files
-
401e6703b59b881eb4eb8972d3892fb0_JaffaCakes118.dll windows:5 windows x86 arch:x86
70b12e9828507704436e8eae3e8bf078
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
VirtualAlloc
GetModuleHandleW
AddConsoleAliasA
BackupSeek
BeginUpdateResourceW
ChangeTimerQueueTimer
CreateConsoleScreenBuffer
CreateDirectoryExW
CreateMailslotA
CreateMailslotW
CreateNamedPipeW
CreateTapePartition
CreateToolhelp32Snapshot
DeleteVolumeMountPointW
EnumCalendarInfoExW
EnumDateFormatsA
EnumSystemCodePagesW
EnumSystemLocalesW
FindNextVolumeMountPointA
FindNextVolumeW
GetAtomNameW
GetCPInfo
GetCPInfoExW
GetCommMask
GetCommProperties
GetCommandLineW
GetComputerNameA
GetConsoleAliasA
GetConsoleAliasExesA
GetConsoleAliasExesLengthW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcessId
GetDiskFreeSpaceExW
GetDriveTypeA
GetFileAttributesExA
GetFileInformationByHandle
GetLocaleInfoW
GetModuleFileNameA
GetNamedPipeHandleStateA
GetNumberOfConsoleMouseButtons
GetOEMCP
GetPrivateProfileStringW
GetProcAddress
GetProcessIoCounters
GetProfileStringA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryW
GetTempFileNameW
GetStartupInfoA
GetWindowsDirectoryW
GetWriteWatch
GlobalFree
GlobalGetAtomNameW
Heap32First
Heap32ListFirst
HeapFree
InterlockedDecrement
IsBadCodePtr
IsValidLocale
LoadLibraryExW
LocalFree
LocalShrink
LocalSize
LocalUnlock
LockResource
Module32First
MoveFileW
MultiByteToWideChar
OpenFile
OpenFileMappingA
OpenFileMappingW
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
Process32NextW
ReadConsoleInputW
ReleaseMutex
ReplaceFileA
RequestDeviceWakeup
RtlFillMemory
SearchPathW
SetCommConfig
SetCommTimeouts
SetConsoleActiveScreenBuffer
SetConsoleTextAttribute
SetFileApisToANSI
SetHandleInformation
SetProcessAffinityMask
SetStdHandle
SetThreadExecutionState
SetThreadIdealProcessor
SetThreadPriorityBoost
SetTimerQueueTimer
SetUnhandledExceptionFilter
SystemTimeToFileTime
VirtualAllocEx
WriteConsoleW
WriteFileEx
lstrcpyn
GetTimeFormatA
CreateFileW
user32
LoadIconW
LoadCursorA
advapi32
RegOpenKeyExW
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ