Static task
static1
Behavioral task
behavioral1
Sample
4088709ab3f0fd632cf4606628dd9794_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4088709ab3f0fd632cf4606628dd9794_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
4088709ab3f0fd632cf4606628dd9794_JaffaCakes118
-
Size
239KB
-
MD5
4088709ab3f0fd632cf4606628dd9794
-
SHA1
d0ec1253584919023ee19ed85f5bb1a78197be92
-
SHA256
dcbdac608a0ef48eaa6f1a353f6225bdc6eda28e7cc667d1ab4d1398ed68bc33
-
SHA512
ceef98b98e0a899cf2918e01d56aadbfd383f57fb1a7e95130070ae8d1e8e09228a2f3169f262afcbb122fec21fc6fd5187224603121e5fad35035530c64743c
-
SSDEEP
6144:z4rV4qpw1FUIqUYkXhi3CAgHNcLBFj/s3G:z4R4qpWFhqZkRi31Nb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4088709ab3f0fd632cf4606628dd9794_JaffaCakes118
Files
-
4088709ab3f0fd632cf4606628dd9794_JaffaCakes118.dll windows:4 windows x86 arch:x86
c9e01342769735c9948e13f1db13e83c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
gdi32
CopyEnhMetaFileA
GetDIBColorTable
GetDCOrgEx
SetPixel
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetFolderPathA
SHGetFileInfoA
SHGetDesktopFolder
SHFileOperationA
SHGetSpecialFolderLocation
comdlg32
GetOpenFileNameA
ChooseColorA
ChooseColorA
FindTextA
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
ChooseColorA
ChooseColorA
FindTextA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
msvcrt
exit
comctl32
ImageList_Destroy
ImageList_Remove
ImageList_Add
ImageList_DragShowNolock
ImageList_Read
ImageList_DrawEx
ImageList_Draw
ImageList_Write
ImageList_GetBkColor
ImageList_GetBkColor
ImageList_Write
user32
GetWindowLongA
TranslateMessage
GetLastActivePopup
SetWindowPlacement
RemovePropA
EnableMenuItem
kernel32
VirtualAlloc
GetCurrentProcessId
GetProcAddress
LoadLibraryA
ExitThread
GetACP
GetModuleHandleA
GetVersionExA
IsBadHugeReadPtr
IsBadReadPtr
GetLastError
ExitProcess
GlobalAlloc
LocalAlloc
VirtualAllocEx
LoadLibraryExA
ole32
CoUninitialize
CreateStreamOnHGlobal
CoDisconnectObject
CoRevokeClassObject
StringFromIID
CoGetMalloc
CoCreateInstanceEx
advapi32
RegEnumKeyExA
RegLoadKeyA
RegQueryValueExA
oleaut32
SafeArrayCreate
RegisterTypeLib
SafeArrayUnaccessData
SysFreeString
SysReAllocStringLen
SysAllocStringLen
shlwapi
SHEnumValueA
SHQueryInfoKeyA
SHSetValueA
SHDeleteValueA
SHQueryValueExA
Sections
CODE Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DATA3 Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA8 Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DATA4 Size: 14KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA0 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ