WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
44caf49c35899b28befbfdf5def333ef_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44caf49c35899b28befbfdf5def333ef_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
44caf49c35899b28befbfdf5def333ef_JaffaCakes118
-
Size
296KB
-
MD5
44caf49c35899b28befbfdf5def333ef
-
SHA1
ec6f55e459b04b1eb106a081c29d63972e6edf34
-
SHA256
d31fdf41d23991714c1bb530cefe74ee5d24938170e5a4b6195aa6aed9ea8e5e
-
SHA512
25063f0e42c9c20b8cecc4c98bd5928ba9f6c4589c08d26f5d54c82bd10156b2485e47e2bcda700a0c5ba01c4764898571857911241e01d38f7cdf6ed82d686d
-
SSDEEP
6144:NAPd3jc8KpskOgXoT8x16INup2c/RhTBt3Y2az:NAF3TfTdR/RhTzIf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44caf49c35899b28befbfdf5def333ef_JaffaCakes118
Files
-
44caf49c35899b28befbfdf5def333ef_JaffaCakes118.dll windows:4 windows x86 arch:x86
d7ae1b3b8ce6e81c352f791aba766a33
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
netapi32
Netbios
kernel32
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
CreateFileA
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
HeapReAlloc
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
RtlUnwind
RaiseException
ExitProcess
HeapSize
SetEndOfFile
GetFileType
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetExitCodeProcess
SetEnvironmentVariableA
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
MoveFileA
InterlockedIncrement
GlobalFlags
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleFileNameW
LocalAlloc
DeleteCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetModuleHandleA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentThreadId
InterlockedExchange
CompareStringW
GetVersion
CompareStringA
WideCharToMultiByte
lstrlenA
GetProcessHeap
HeapAlloc
HeapFree
MultiByteToWideChar
ReleaseMutex
WaitForSingleObject
CreateMutexA
OpenMutexA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
CloseHandle
CreateProcessA
CreateThread
GetModuleFileNameA
OpenProcess
FreeLibrary
GetProcAddress
LoadLibraryA
GetPrivateProfileStringA
ExpandEnvironmentStringsA
WritePrivateProfileStringA
GetPrivateProfileIntA
Process32Next
GetVersionExA
GetLastError
Process32First
CreateToolhelp32Snapshot
DeleteFileA
Sleep
CreateDirectoryA
GetCurrentProcessId
GetTickCount
SetStdHandle
user32
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
UnregisterClassA
UnhookWindowsHookEx
GetWindowTextA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
PostQuitMessage
LoadIconA
RegisterWindowMessageA
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
CharUpperA
FindWindowA
PostMessageA
GetWindowThreadProcessId
IsWindowVisible
GetWindow
IsWindow
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassLongA
GetCapture
GetWindowLongA
WinHelpA
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
ClientToScreen
ShowWindow
SetWindowTextA
GetSystemMetrics
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyA
GetUserNameA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
RegSetValueExA
OpenSCManagerA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
shlwapi
PathFindExtensionA
UrlUnescapeA
PathStripToRootA
PathFindFileNameA
PathIsUNCA
oleaut32
VariantInit
VariantChangeType
VariantClear
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
ws2_32
gethostbyname
wininet
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
Exports
Exports
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ