Static task
static1
Behavioral task
behavioral1
Sample
52dff6f666d7e36321ff4e3fe4e2b414_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52dff6f666d7e36321ff4e3fe4e2b414_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
52dff6f666d7e36321ff4e3fe4e2b414_JaffaCakes118
-
Size
168KB
-
MD5
52dff6f666d7e36321ff4e3fe4e2b414
-
SHA1
f5ab94ac1e61802e252020fbeb746dc00e28a2a9
-
SHA256
dd476e293b8aad769d3a952a732843f30f90cf4859b5160e7a91150a8f9d111d
-
SHA512
10e6dff882582b10f9bb673c85c5cf60b8d02ce525fe8d9216779f01c5b63870afdd82129733dbe243247b14f0b4ce144e01c5a0deb8523cb0ea90ae884484f7
-
SSDEEP
3072:lEDMNMc1++8oGOetqLIufvp22ZwtmI921YcrvnU3Rfxvj74Fg1vhXflTbbEj0mNV:TNMNN5OaIL57ZwN2eEvUJh7jvhXd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52dff6f666d7e36321ff4e3fe4e2b414_JaffaCakes118
Files
-
52dff6f666d7e36321ff4e3fe4e2b414_JaffaCakes118.dll windows:4 windows x86 arch:x86
fa86595294e370d45283d3b19895babc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemTime
FreeLibrary
GetProcAddress
CompareFileTime
GetDriveTypeW
CreateMutexW
DeleteCriticalSection
GetModuleFileNameW
GetVolumePathNameW
CreateDirectoryW
SetLastError
RaiseException
EnterCriticalSection
OpenFileMappingW
DuplicateHandle
CompareStringW
LoadLibraryA
LeaveCriticalSection
ExpandEnvironmentStringsW
CreateProcessW
LoadLibraryExW
lstrlenW
LoadResource
SizeofResource
lstrlenA
lstrcpynW
lstrcatW
InitializeCriticalSection
InterlockedDecrement
lstrcpyW
SetFilePointer
TlsSetValue
GetTickCount
IsBadWritePtr
WideCharToMultiByte
MultiByteToWideChar
GetACP
lstrcmpiA
LoadLibraryW
lstrcmpA
lstrcmpW
DeleteFileA
DeleteFileW
ReadFile
TlsGetValue
lstrcpynA
GetProfileIntW
CloseHandle
GetFileAttributesW
LocalAlloc
LocalFree
InterlockedIncrement
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateFileW
HeapFree
GetProcessHeap
HeapAlloc
GetWindowsDirectoryW
GetCommandLineA
GlobalFree
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
InterlockedExchange
GetCommandLineW
Sleep
GlobalUnlock
lstrcmpiW
VirtualProtect
FindResourceW
GlobalAlloc
user32
GetMenu
GetCursorPos
InvalidateRect
CheckMenuRadioItem
IsWindowVisible
MoveWindow
BeginDeferWindowPos
EndDeferWindowPos
CheckRadioButton
SetFocus
UpdateWindow
GetWindowRect
GetDC
ReleaseDC
ShowWindow
GetParent
EnumChildWindows
EnableWindow
GetDlgItem
CharLowerW
PostMessageW
PostMessageA
SetWindowTextW
SetWindowTextA
SystemParametersInfoW
SystemParametersInfoA
SendDlgItemMessageW
SendDlgItemMessageA
SendMessageW
SendMessageA
LoadStringA
GetSysColor
CheckMenuItem
GetActiveWindow
MessageBoxW
GetSystemMetrics
LoadStringW
BeginPaint
EndPaint
SetScrollInfo
DefWindowProcW
FillRect
SetRect
SetWindowPos
GetClientRect
GetWindowLongW
TranslateMessage
IsWindow
GetPropW
DestroyWindow
RemovePropW
PostQuitMessage
SetPropW
SetTimer
CharNextW
CharPrevW
SetWindowLongW
DispatchMessageW
advapi32
RegQueryValueExW
RegEnumValueA
RegQueryValueExA
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegisterEventSourceA
DeregisterEventSource
ReportEventW
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
SetTokenInformation
InitializeSid
GetSidLengthRequired
CreateRestrictedToken
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
gdi32
GetFontResourceInfoW
AddFontResourceW
RemoveFontResourceW
CreateCompatibleDC
DeleteObject
SelectObject
DeleteDC
ole32
StringFromCLSID
CoGetMalloc
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
ReleaseStgMedium
PropVariantClear
CoTaskMemFree
msvcr71
_onexit
memmove
_vsnwprintf
memset
_amsg_exit
free
_XcptFilter
_wcsnicmp
wcschr
_adjust_fdiv
_initterm
strncat
memcpy
_wcslwr
realloc
malloc
wcslen
wcsncpy
__CppXcptFilter
__dllonexit
_except_handler3
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ