Static task
static1
Behavioral task
behavioral1
Sample
44e3428168a0fa5eb1449cb066ad73a0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44e3428168a0fa5eb1449cb066ad73a0_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
44e3428168a0fa5eb1449cb066ad73a0_JaffaCakes118
-
Size
140KB
-
MD5
44e3428168a0fa5eb1449cb066ad73a0
-
SHA1
5eb48f9038364011a4b3281b2c5f79587ae5c948
-
SHA256
8be03578480778ee2d319def9dc863934cd6c02b34100ddd53f79df24fe8ca57
-
SHA512
7d76b10ff75244db710cc95e4266057889b130852f423533a2dc84b07fb40d2df1fec611a1af20ade09f167d0b3e29ed6144ae617f536c4a149cdfcbf25468f0
-
SSDEEP
3072:DjHVIz5YoaLa58yLIpuXNeqppBLAm+mCEssSXQ6PicdkWGqzjTk:PcaLPyUu5JzAsJ/i1Gqzk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44e3428168a0fa5eb1449cb066ad73a0_JaffaCakes118
Files
-
44e3428168a0fa5eb1449cb066ad73a0_JaffaCakes118.dll windows:5 windows x86 arch:x86
2f1ac971a0b96ed6fcb4ec54c9374b20
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileMappingA
CreateMutexA
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceA
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileSize
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
HeapAlloc
HeapCreate
CreateFileA
HeapFree
HeapReAlloc
InterlockedExchange
IsDBCSLeadByteEx
LCMapStringA
LCMapStringW
LoadLibraryA
MapViewOfFile
MultiByteToWideChar
QueryPerformanceCounter
ReleaseMutex
RtlUnwind
SetEndOfFile
SetFilePointer
SetHandleCount
SetUnhandledExceptionFilter
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
GetStartupInfoW
VirtualAllocEx
CreateDirectoryA
HeapDestroy
CloseHandle
user32
GetWindowThreadProcessId
LoadCursorA
LoadIconA
SetForegroundWindow
LoadStringA
MessageBoxA
SendMessageTimeoutA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
shlwapi
StrCmpIW
SHSetValueA
SHGetValueA
PathRemoveFileSpecA
StrStrIA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata2 Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ