Static task
static1
Behavioral task
behavioral1
Sample
46275691b46b3003293d7f4a866cb5ef_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
46275691b46b3003293d7f4a866cb5ef_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
46275691b46b3003293d7f4a866cb5ef_JaffaCakes118
-
Size
127KB
-
MD5
46275691b46b3003293d7f4a866cb5ef
-
SHA1
de342473c7a8eba7e8b7afef74ffad0d66d46615
-
SHA256
b879a29094b5f06d932fbcfface2b6f4cc870ec4224e24ce85718e12bfa8f2b2
-
SHA512
73e2dfc2c9712dea38e9f6233930fa31362aee0779e6c65166eb4ab25780523cc337bcea205b3053158b24d19ab314338056f37cbad3567dca48d05aa4193479
-
SSDEEP
3072:ITXt3lrlEWANCA8WrTuqqdutbfmUvNSh/5eUqaFzvQqbFPJRq:q3lrlfANCXWrTjqd0fXvyqaFz1Rfq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46275691b46b3003293d7f4a866cb5ef_JaffaCakes118
Files
-
46275691b46b3003293d7f4a866cb5ef_JaffaCakes118.dll windows:4 windows x86 arch:x86
e7b60b434abf847f073a5172df160546
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateThread
ExitThread
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleHandleA
GetOEMCP
GetPriorityClass
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
IsBadCodePtr
IsBadReadPtr
IsBadStringPtrA
IsBadWritePtr
LCMapStringA
LCMapStringW
LoadLibraryA
LocalAlloc
MultiByteToWideChar
OpenProcess
OutputDebugStringA
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetFileAttributesA
SetHandleCount
SetPriorityClass
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WideCharToMultiByte
WriteFile
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
user32
AppendMenuA
CallWindowProcA
CharLowerBuffA
CharUpperA
CheckDlgButton
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateDialogParamA
CreatePopupMenu
DefDlgProcA
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EnumClipboardFormats
FindWindowA
GetActiveWindow
GetClassInfoA
GetClientRect
GetClipboardData
GetCursorPos
GetDlgItem
GetDlgItemTextA
GetMenu
GetMessageA
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
InsertMenuItemA
InvalidateRect
IsDialogMessageA
IsDlgButtonChecked
IsMenu
IsWindow
KillTimer
LoadAcceleratorsA
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
OpenClipboard
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClassA
RemoveMenu
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetClipboardData
SetCursor
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetMenuItemInfoA
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowTextA
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
UnregisterClassA
wsprintfA
wvsprintfA
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 110KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ