Static task
static1
Behavioral task
behavioral1
Sample
43dbbbf9f5ea791c2c4ce7a1ea74aca6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43dbbbf9f5ea791c2c4ce7a1ea74aca6_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
43dbbbf9f5ea791c2c4ce7a1ea74aca6_JaffaCakes118
-
Size
148KB
-
MD5
43dbbbf9f5ea791c2c4ce7a1ea74aca6
-
SHA1
ef34bc9187a92fec858de788391a3cd10c01035e
-
SHA256
8853e44862c04be72124380a9249aac452774f93ede17f3719001cdf0ad23748
-
SHA512
9d3a38feb5472bb390a56d9eeeec6437381da137c70df6b21f2d5eaa5c73fb4ef1fd23923ec6552604e8d92e02268757f5876c9edacdb0e87a7142875697148a
-
SSDEEP
3072:Blb4SO7bhveFioGzPRFYdSvASNZR7UJpgtw5hO/z66ch1HUig7QEOUn+vrpdMZmk:D4S+QGzpBZw8zmzUiOQEOUn+vrpdMZS0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43dbbbf9f5ea791c2c4ce7a1ea74aca6_JaffaCakes118
Files
-
43dbbbf9f5ea791c2c4ce7a1ea74aca6_JaffaCakes118.dll windows:4 windows x86 arch:x86
d4cdf7f4f87619845364a3c020d9addb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetTickCount
GetFileTime
SetFileTime
CopyFileA
GetLastError
FindClose
CreateDirectoryA
FindFirstFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
GetLogicalDrives
FindNextFileA
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GetVersionExA
GetWindowsDirectoryA
GetDriveTypeA
Module32Next
Module32First
MoveFileA
GetModuleFileNameA
ExitProcess
VirtualFree
VirtualAlloc
GetCurrentProcessId
CreateProcessA
GetEnvironmentVariableA
DuplicateHandle
GetCurrentProcess
SetStdHandle
CreatePipe
GetStdHandle
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
WaitForSingleObject
GetModuleHandleA
LoadLibraryA
FreeLibrary
RemoveDirectoryA
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
GetProcAddress
HeapReAlloc
GetOEMCP
GetACP
GetCPInfo
HeapAlloc
HeapFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeLibraryAndExitThread
GetLocalTime
lstrcpyA
GetSystemInfo
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcmpA
lstrlenA
lstrcpynA
Sleep
DeleteFileA
SetEndOfFile
lstrcmpiA
EnterCriticalSection
GetExitCodeThread
CreateThread
LeaveCriticalSection
WriteFile
GetSystemDirectoryA
lstrcatA
CreateFileA
GetFileSize
SetFilePointer
ReadFile
CloseHandle
DeleteCriticalSection
VirtualAllocEx
InitializeCriticalSection
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetVersion
GetCommandLineA
user32
GetWindowTextLengthA
GetForegroundWindow
GetWindow
IsWindowVisible
GetTopWindow
ShowWindow
PostMessageA
SetWindowTextA
SetWindowsHookExA
CallNextHookEx
GetKeyState
GetWindowTextA
wsprintfA
GetGUIThreadInfo
UnhookWindowsHookEx
DefWindowProcA
PostQuitMessage
UnregisterClassA
DestroyWindow
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
UpdateWindow
GetDesktopWindow
GetDC
SetCursorPos
SendInput
ReleaseDC
MessageBoxA
PostThreadMessageA
RegisterClassExA
CreateWindowExA
gdi32
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
BitBlt
GetObjectA
GetStockObject
SelectPalette
RealizePalette
GetDIBits
DeleteDC
DeleteObject
CreateDCA
advapi32
RegSaveKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegRestoreKeyA
shell32
ShellExecuteA
ws2_32
gethostbyname
gethostname
__WSAFDIsSet
select
recv
sendto
htons
socket
closesocket
htonl
setsockopt
bind
listen
send
connect
inet_addr
accept
ioctlsocket
WSACleanup
WSACancelBlockingCall
WSAStartup
inet_ntoa
recvfrom
WSASocketA
WSAGetLastError
shlwapi
SHDeleteKeyA
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
wcershar Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ